Search Results
- Articles
- Books & Media
- Our Website
- Collection Guides
- Archival Materials
ArticlesSee all articles results »
From journals and magazines
-
Hash-One: a lightweight cryptographic hash function
http://duke.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LSyQxEA4-Ll52fcGOrtKKeBBak86jOyKCDtM4Xnyz7CmkuxNmQMZBR5a9-RP8jf4Sq_oxOggKnhrSldBUpZKvU6mvCNnyOmLCKxlS4W0oCmpDXQgdFtQpzNxNfIbnkH-S07_RxWWStqdIu8mFqfghxgdu6Bnleo0ObrOqCgmAWjBi343CvkfGbSZ3Mb41TWYB3Mc42SNx3izHEiniyqxIycD1qR6HNvXehyEmNqdpeD2BO9-j13L7SefJjxo3BkeVoRfIlBsskp9NTYagdtEl0j7oHZ7Yh97BXu_w5en5bOD2Axvc4i_4v_IUNACB_P7_cFRxVffzoAfiAe5vaCPst0xu0s51-ySsCyWEOaxzPFQ0SwrPfKGRf81jJBXTAIvYWyGkVZ4VgJOUyp2OcxbD00fOUeW4po7RjP8iAbiutJmSjOexkE4hrztzTDDPE5dz2SK0UY3Ja_pwrGJxa8owttAG1GVAmwa1aVCbLbIz7jKsuDM-E97GttqDHj4T3JwQ7HauTTe9ehMww8K3yEZjNwP-gkEQO3B3jzAuQE4VaclFi_DSoF9_m-ledaLjFPElX_lWr1UyB-2qupz2m8yM7h_dWlV_Yr2crq9U_etu
Iet Information Security, Volume 10, Issue 5, pp. 225 - 231
Journal Article : Full Text Online
-
A low-area unified hardware architecture for the AES and the cryptographic hash (...)
http://duke.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV3NS8MwFA_DkxfnFzi_yMGb1DVL0g8Ygzk3xZtOEU-hbRLXMerYOob_mXf_MfOadjiQHfTWhjxo8wvvPZLf-z2ELnTYIkx73HGZjhwm3cgJJQsd6SoPKncDHcM55Etw_9p6eAwGvRrqVbUwQKssfb_16YW3Lkea5Wo2p2naHELw86mJWCC5zgIoNDfZBOzswc316iaBcOuNQYoTZpeFM5bjNZ5KkDEkvpXuDH8PTpYZWQScQR1l1acWbOsryzax5w5rNOxKz_Gff7WLdsrUFHftvD1UU9k-qldtH3DpBQ7QWxdP3pdOZNJNvMhSbZJYDLVbSzOCf15MYJMQY5Ng4m5_iKNMFs_tUSeZfUxzK5WdJsZ0PsIQXmGLtJujDr6dfX3O88kheh70n3p3TtmvwUloyHPHdxV1o1hppqkPN46KuFIbbxsqLSVRUilPecwAwhTxXEk93YpbPI51JGPpJ_QIYeNBeBR7nNDEZ1x5IC9PFGFE00AllDcQqRASSaliDs00JqKiq40FoCoAVeESYVBtoMuVzdRqeGyczSvgxRpmwgSZDXbHf7Q7QdvwZkmFp2grny3UmW1NcV5s5W8es_4a
Journal Of Parallel And Distributed Computing, Volume 106, pp. 106 - 120
Journal Article : Full Text Online
-
Synthetic and real data sets for benchmarking non-cryptographic hash functions (...)
http://duke.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1LSwMxEA7iyYtYFXyWOXjQQ-huk-xmoRS0uKg3HyCelmSTsActpbs99Df5J50kK_TmQT0FQh5kSDLfDDPfEHLhinHKXSZowp2i3CSKFoYX1CQ285m70mnvh3yVD2_jxydZzjZKffmYsEgPHAU3cjXLpWZCJxY1kailyaUqpFbGGiMK7X9ftMo3jKmYH4wwIZQ8xWZMGfcBh9-k_KzXHuUe2e1hH1zH7QZky873yaB_WC1c9uzPVwfk83k9R1CG4wCNfEBM9w4-jBNa27WAEBM0zmk-VHByA1rvdNJM6-V60UX2aZzYqLYBr7HCpZqMmin8y6qH5L68fZndUX_kahGJKypPJR06UMBVL-DqJwGzIwL4roXSmUhZnXNhM0_6ntqUp45JWzNxTG5-v9HJXyxySnYQ0hQxRO-MbHfLlT2PhR6G4YoMg0PnC6Umzl4
Data In Brief, Volume 25.
Journal Article : Full Text Online
Books & MediaSee all books & media results »
Books, music, movies and more
-
The Hash Function BLAKE
https://find.library.duke.edu/catalog/DUKE99119540695208501
Book : View Online
-
Symmetric Cryptographic Protocols
https://find.library.duke.edu/catalog/DUKE99119541217008501
Book : View Online
-
The theory of hash functions and random oracles : an approach to modern cryptography
https://find.library.duke.edu/catalog/DUKE99119479701008501
Book : View Online
Collection Guides
Detailed inventories of archival collections
Some materials and descriptions may include offensive content. More info