News
This paper presents a new secure hash algorithm based on dynamic structure algorithm called Secure Hash Dynamic Structure Algorithm (SHDSA). It uses a famous secure hash algorithm (SHA) given by the ...
Chaotic Hash Functions and Cryptographic Algorithms Publication Trend The graph below shows the total number of publications each year in Chaotic Hash Functions and Cryptographic Algorithms.
This paper presents a Sponge structure modulation of the MD5 and SHA-1 hash functions. The work employs the Keccak permutation function to build the proposed scheme. The work discusses the main two ...
A series of attacks on MD5, a hashing algorithm that's much more collision-prone than SHA1, provides a glimpse at the dire results of collision attacks. The Flame espionage malware, which the US ...
Algorithms similar to those employed by Netflix and Spotify to customise services are now better than human doctors at spotting who will die or have a heart attack.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results