Abstract: Nowadays, the increase in internet speed has increased the amount of data. With this increase, secure transmission of the data gained importance. Some data are important and sensitive.
Hackers do not take a coffee break. Therefore, understanding each cybersecurity term inside out is a must. You might’ve heard the term ‘Secure Hashing Algorithm’ somewhere along your cybersecurity ...
Abstract: In view of the deficiency that the hash length of the standard hash algorithm cannot be adjusted adaptively according to the attack strength, this paper defines the weighted probability ...
Hash tables are only O(1) when there is a reasonably good hashing algorithm. Perhaps the data is such that it's difficult to write a algorithm that has predictably good performance. Hash table ...
This tool is used to identify encryption algorithms during reverse engineering analysis. The method is to test a list of encryption algorithms with parameters retrieved during the analysis: encrypted ...
1 School of Communications and Information Engineering, Shanghai University, Shanghai, China. 2 Institute of Smart City, Shanghai, China. With the rapid development of information technology, demand ...
When developing programs or websites, it is very convenient to use relational databases, which contain powerful and convenient tools that allow to work with data very flexibly and get the necessary ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results