Skip main navigation

Cookies Notification

We use cookies on this site to enhance your user experience. By continuing to browse the site, you consent to the use of our cookies. Learn More
×

System Upgrade on Tue, May 28th, 2024 at 2am (EDT)

Existing users will be able to log into the site and access content. However, E-commerce and registration of new users may not be available for up to 12 hours.
For online purchase, please visit us again. Contact us at customercare@wspc.com for any enquiries.

SEARCH GUIDE  Download Search Tip PDF File

  Bestsellers

  • articleNo Access

    ON REGULAR EXPRESSION HASHING TO REDUCE FA SIZE

  • articleNo Access

    A Mathematical Problem for Security Analysis of Hash Functions and Pseudorandom Generators

  • articleNo Access

    TWO ATTACKS ON A TWO-FACTOR USER AUTHENTICATION IN WIRELESS SENSOR NETWORKS

  • articleNo Access

    HASH FUNCTION CONSTRUCTION BASED ON THE CHAOTIC LOOK-UP TABLE WITH CHANGEABLE PARAMETER

  • articleNo Access

    An efficient (t,n) threshold quantum secret sharing without entanglement

  • articleNo Access

    High Speed FPGA Implementation of Cryptographic KECCAK Hash Function Crypto-Processor

  • articleNo Access

    Area-Throughput Trade-Offs for SHA-1 and SHA-256 Hash Functions’ Pipelined Designs

  • articleNo Access

    Parloom: A New Low-Power Set-Associative Instruction Cache Architecture Utilizing Enhanced Counting Bloom Filter and Partial Tags

  • articleNo Access

    KMPH: Key Management Scheme Based on Pool-Hash for WSN

  • articleNo Access

    A CHAOS-BASED CRYPTOGRAPHIC HASH FUNCTION FOR MESSAGE AUTHENTICATION

  • articleNo Access

    ECM-IBS: A Chebyshev Map-Based Broadcast Authentication for Wireless Sensor Networks

  • articleNo Access

    Design and Analysis on a Parallel Chaos-Based Hash Function

  • articleNo Access

    A Fast Encryption Scheme Suitable for Video Surveillance Applications Using SHA-256 Hash Function and 1D Sine–Sine Chaotic Map

  • articleNo Access

    Blockchain Technology and Smart Contract Application in Security Management of Intelligent Chemical Plants

  • articleNo Access

    Comment on "Cryptanalysis and improvement of the secure quantum sealed-bid auction with post confirmation"

  • articleNo Access

    BREAKING AND REPAIRING AN APPROXIMATE MESSAGE AUTHENTICATION SCHEME

  • chapterNo Access

    A RUN-LENGTH SLOTTING APPROACH TO ENHANCE WATERMARK SECURITY