From post

Comparison of the Power Consumption of the 2nd Round SHA-3 Candidates.

, , и . ICT Innovations, том 83 из Communications in Computer and Information Science, стр. 102-113. (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Generic Collision Attacks on Narrow-pipe Hash Functions Faster than Birthday Paradox, Applicable to MDx, SHA-1, SHA-2, and SHA-3 Narrow-pipe Candidates., и . IACR Cryptology ePrint Archive, (2010)The Digital Signature Scheme MQQ-SIG., , , , , , и . IACR Cryptology ePrint Archive, (2010)HashTag Erasure Codes: From Theory to Practice., , , и . IEEE Trans. Big Data, 4 (4): 516-529 (2018)On the Importance of the Key Separation Principle for Different Modes of Operation., , и . ISPEC, том 4991 из Lecture Notes in Computer Science, стр. 404-418. Springer, (2008)CryptoCloak protocol and the prototype application., , и . CNS, стр. 721-722. IEEE, (2015)Construction of Multivariate Quadratic Quasigroups (MQQs) in arbitrary Galois fields., , и . IAS, стр. 314-319. IEEE, (2011)Hybrid greedy and genetic algorithms for optimization of relational data warehouses., , и . Artificial Intelligence and Applications, стр. 500-506. IASTED/ACTA Press, (2007)Stream cipher based on quasigroup string transformations in Zp*. CoRR, (2004)The Meshwork Ledger, its Consensus and Reward Mechanisms., и . COMSNETS, стр. 290-298. IEEE, (2021)DoS Attacks on Blockchain Ecosystem., и . Euro-Par Workshops, том 13098 из Lecture Notes in Computer Science, стр. 230-242. Springer, (2021)