Abstract: This paper aimed to suggest a new Secured Hash Algorithm 3 (SHA-3) with seed value implementation. Seed worth ensuring that there are fewer expectations collisions, despite an attacker ...
Abstract: Spintronics-based devices for hardware security primitives have gained much interest due to their unique physical characteristics. In this work, the Cryptographic hash function (CHF) ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results