Font Size: a A A
Keyword [Hash function]
Result: 61 - 80 | Page: 4 of 10
61. A Double-length Hash Function Based On AES
62. Design And Implement Of Digital Signature Client Based On PKI
63. Theory And Applications Of Ring Signatures Over Elliptic Curves
64. Methods For Generating Secure Pseudorandom Floating Point Numbers
65. Research On Chaotic Image Encryption Technology Based On Control Word
66. Cryptanalysis Of Hash Function HAS-160 And MD5 Potential Danger
67. Research And Implement Of Secure Communication System Based On HMAC
68. Research And Implement Of Digital Signature System
69. Research Of Elliptic Curve Digital Signature Scheme
70. Algorithm Analysis And Collision Research On Hash Function
71. A Remote Password Authentication Scheme Based On Smart Card
72. Security Analysis Of Hash Function MD5
73. Research On Fragile Digital Watermarking Algorithms For Image Authentication
74. Research On The Digital Watermark
75. Threshold Group Signature Schemes Based On RSA
76. The Application Of Probability And Statistics In The Computer Of Cryptography
77. Research And Application Of The Security Mechanisms In DTV System
78. Research On Image Fragile Digital Watermarking
79. Research Of Pairwise Key Establishment Schemes In Wireless Sensor Networks
80. A Variant Of MDx Hash Function-GIN
  <<First  <Prev  Next>  Last>>  Jump to