لطفا کمی صبر نمایید ...
ورود
Advanced Search
Thesis
مقالات فارسی
ISI
کنفرانسها
ژورنالها
Papers
ISI
EVENTS
Journals
PPROCEEDINGS
Meetings
Login / Register
Papers
ISI
EVENTS
Journals
PPROCEEDINGS
Meetings
Thesis
Dark Mode
استعلام پایان نامه
جستجوی مقالات داخلی
Catehory
Conference Papers
Journal Papers
Books
Plans
Research documents
Rports
Result Type:
Full Text
Has Word File
Search regardless of the position of the words
Limit article publication year to:
All years
Specific years:
Search
Show
All Information
Only Paper Title
Item Per Page
10
20
Sort By
Paper title
Year
Indexing
ABS
DESC
فیلتر نتایج
نتایج 1 تا 10 از مجموع 16
1
2
Journal Paper
Brand New Categories of Cryptographic Hash Functions: A Survey
Authors:
B. Sefid-Dashti
،
J. Salimi Sartakhti
،
H. Daghigh
Year 1402
Publish place:
Journal of Electrical and Computer Engineering Innovations Issue 2، Vol 11
Pages:
20
| Language: English
View And Download
Conference Paper
ASIC Implementation of Chained Cryptographic Hash functions
Authors:
Hayder Hassan Ibrahim Al-TAMEEMI
،
Atefeh Salimi
Year 1401
Publish place:
7th National Conference on New Idea on Electrical Engineering
Pages:
5
| Language: English
View And Download
Conference Paper
بررسی الگوریتم چکیده ساز JH در محیط سیمولاتور و سنتس آن
Authors:
ابراهیم سلیمان هومر
،
مهدی جوانمردی
Year 1401
Publish place:
The 8th International Conference on Electrical,computer and mechanical engineering
Pages:
12
| Language: Persian
View And Download
Conference Paper
بررسی الگوهای بهینه کدنگاری مقاوم به منظور اجرا روی مدار مجتمع دیجیتال برنامه پذیر
Authors:
ابراهیم سلیمان هومر
،
مهدی جوانمرد
Year 1401
Publish place:
2nd International Conference on Electrical, Computer and Mechanical Engineering
Pages:
19
| Language: Persian
View And Download
Journal Paper
A NEW SECRET SHARING SCHEME ADVERSARY FUZZY STRUCTURE BASED ON AUTOMATA
Authors:
Ali Saeidi Rashkolia
،
Mohammad Mahdi Zahedi
،
Masoud Hadian Dehkordi
Year 1397
Publish place:
Iranian Journal of Fuzzy Systems Issue 4، Vol 15
Pages:
11
| Language: English
View And Download
Journal Paper
Throughput Improvement of RIPEMD-۱۶۰ Design using Unfolding Transformation Technique
Authors:
Shamsiah binti Suhaili
،
Takahiro Watanabe
،
Norhuzaimin Julai
Year 1401
Publish place:
Journal of Optimization in Industrial Engineering Issue 1، Vol 15
Pages:
10
| Language: English
View And Download
Journal Paper
Multicollision Attack on a recently proposed hash function vMDC-۲
Authors:
Zahra Zolfaghari
،
Hamid Asadollahi
،
Nasour Bagheri
Year 1395
Publish place:
Journal of Computing and Security Issue 4، Vol 3
Pages:
5
| Language: English
View And Download
Conference Paper
Improvement the confidentiality of data in the body wireless sensor networks using cryptographic algorithms
Authors:
Ehsan Miri
،
Behrooz Shahrokhzadeh
Year 1400
Publish place:
20th Iranian Student Conference on Electrical Engineering
Pages:
15
| Language: English
View And Download
Conference Paper
A secret sharing scheme by automata
Authors:
Ali Saeidi Rashkolia
Year 1399
Publish place:
11th International Conference on Information Technology, Computer and Telecommunications
Pages:
5
| Language: English
View And Download
Journal Paper
Provable Data Possession Scheme based on Homomorphic Hash Function in Cloud Storage
Authors:
li yu
،
junyao ye
،
Kening Liu
Year 1395
Publish place:
Advances in Computer Science : an International Journal Issue 1، Vol 5
Pages:
7
| Language: English
View And Download
نتایج 1 تا 10 از مجموع 16
1
2