News
From infostealers commoditizing initial access to a more targeted approach to ransomware attacks, cybercriminals’ malware ...
Azul reduces false positives in Java vulnerability detection by only flagging vulnerabilities in code paths that are actually ...
Abstract: In this paper, a new chaos-based hash function is proposed based on a recently proposed structure known as the deterministic chaotic finite state automata (DCFSA). Out of its various ...
Abstract: In this paper, we analyze collision resistance of the JH hash function in the ideal primitive model. The JH hash function is one of the five SHA-3 candidates accepted for the final round of ...
Add a description, image, and links to the hash-algorithm topic page so that developers can more easily learn about it.
This library contains an extensible framework for implementing hashing algorithms that can support user-defined types, based on the paper "Types don't know #" by Howard Hinnant, Vinnie Falco and John ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results