Computing practitioners encounter hash functions almost every day, although they may not necessarily be the center of attention. When you install software packages or updates, the authenticity of a ...
By developing a theory linking 2-D extended Boolean functions with 2-D arrays, we establish an efficient construction of 2-D ZCACSs. In contrast to previous work, the proposed construction is capable ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results