Keywords: توابع هش; Symmetric encryption; Secret key; Private key; Cryptography; Digital signatures; Hash functions; Lockbox; Block ciphers;
مقالات ISI ترجمه شده توابع هش
مقالات ISI توابع هش (ترجمه نشده)
مقالات زیر هنوز به فارسی ترجمه نشده اند.
در صورتی که به ترجمه آماده هر یک از مقالات زیر نیاز داشته باشید، می توانید سفارش دهید تا مترجمان با تجربه این مجموعه در اسرع وقت آن را برای شما ترجمه نمایند.
در صورتی که به ترجمه آماده هر یک از مقالات زیر نیاز داشته باشید، می توانید سفارش دهید تا مترجمان با تجربه این مجموعه در اسرع وقت آن را برای شما ترجمه نمایند.
Keywords: توابع هش; Business artifact; Business process; Document lifecycle; Lifecycle policy; UML statechart; Business Process Modelling Language; Linear Temporal Logic; Finite-state automata; Trace validation; Policy enforcement; Public-key encryption; Hash functions; Tamp
Keywords: توابع هش; Bootable examination environment; Bootable CD; Bootable DVD; Hash functions; Differential analysis;
Design and implementation of totally-self checking SHA-1 and SHA-256 hash functions' architectures
Keywords: توابع هش; Cryptography; Hash functions; SHA-1; SHA-256; Totally Self-Checking; Concurrent Error Detection;
Integral distinguishers for reduced-round Stribog
Keywords: توابع هش; Cryptography; Hash functions; Integral distinguisher; GOST R 34.11-2012; Stribog
A novel fast and provably secure (t,n)-threshold secret sharing construction for digital images
Keywords: توابع هش; Verifiable secret sharing; Hash functions; Secure ciphering; Linear complexity
Second order collision for the 42-step reduced DHA-256 hash function
Keywords: توابع هش; Cryptography; Cryptanalysis; Hash functions; Second order collisions; Boomerang attack; DHA-256
Memoryless near-collisions, revisited
Keywords: توابع هش; Cryptography; Hash functions; Memoryless near-collisions; Covering codes
Increasing the flexibility of the herding attack
Keywords: توابع هش; Cryptography; Hash functions; Chosen-target-forced-prefix; Generalized herding attack; Hypergraphs
On the cryptanalysis of the hash function Fugue: Partitioning and inside-out distinguishers
Keywords: توابع هش; Cryptography; Hash functions; Cryptanalysis; Fugue
Group theoretic properties of Rijndael-like ciphers
Keywords: توابع هش; Cryptography; Permutation groups; Block ciphers; Rijndael; Hash functions
D-cash: A flexible pre-paid e-cash scheme for date-attachment
Keywords: توابع هش; Electronic cash; Date-attachment; Pre-paid systems; Anonymity; Blind signatures; Hash functions
A note on local randomness in polynomial random number and random function generators
Keywords: توابع هش; Local randomness; Hash functions; Random function generator; Discrepancy;
A new protocol to counter online dictionary attacks
Keywords: توابع هش; Authentication; Online dictionary attacks; Hash functions; Cryptographic protocol; Passwords