News
Malware-laced PyPI and npm packages steal developer credentials, CI/CD data, and crypto wallets. Attacks target macOS, AI ...
Abstract: In this paper, we analyze collision resistance of the JH hash function in the ideal primitive model. The JH hash function is one of the five SHA-3 candidates accepted for the final round of ...
Abstract: In this paper, an improved version of RC4 based hash function is proposed and we call it RC4-BHF. RC4-BHF is much efficient than well-known hash functions (e.g., MD4, MD5 and SHA-1) and it ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results