News
North Korean hackers are behind a new macOS malware campaign that targets the crypto industry using fake Zoom invites.
One of the first and most used hashing algorithms in blockchains is SHA-256 so the main aim of this paper is how to increase the security level of the blockchain based on the increasing hashing ...
A hash function based on sponge structure with chaotic mapping (SSCM) algorithm is designed for spinal codes to degrade high time complexity. The internal permutation function of the designed hash ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results