Font Size: a A A
Keyword [Keccak]
Result: 1 - 17 | Page: 1 of 1
1. Research For Hardware Implementation Of SHA-3Algorithms
2. Design And Implementation Of SHA-3Based RFID Authentication Protocol
3. Research On Keccak-like Hash Function
4. Research And Implementation Of Secure Hash Algorithm In Embedded System
5. Cryptanalysis Of Hash Functions And Improved Design Of Wide Pipe Hash Structure
6. Reaserch For Hardware Implementation Of Keccak Algorithms And Its Optimization
7. Security Analysis And Implementation Of Keccak In SHA-3 Standard
8. Design And Implementation Of SHA-3 Algorithms Based On FPGA
9. GPU Acceleration Of Key Algorithms In Blockchain
10. (Conditional) Cube Cryptanalysis Of Several Keccak-based Authenticated Encryption Ciphers
11. Conditional Cube Attack On Reduced-Round Keccak Sponge Function
12. Several Cryptanalysis Methods On Block Ciphers
13. The Research And Implementation Of Hardware Cryptographic Algorithms To Resist Fault Attack
14. Research On Distributed Deduplication Technology
15. Study And Design Of Keccak Algorithm Fault Detection System Based On FPGA
16. Analysis of KECCAK Tree Hashing on GPU Architectures
17. Research And Implementation Of Third-party Application Data Protection For Mobile Phone Users Based On Blockchain
  <<First  <Prev  Next>  Last>>  Jump to