Sign Up to like & get
recommendations!
1
Published in 2019 at "Journal of King Saud University - Computer and Information Sciences"
DOI: 10.1016/j.jksuci.2019.10.003
Abstract: Abstract Provably secure keyless hash function uses Random Oracle (RO) or Sponge principles for the design and construction of security-centric hash algorithms. It capitalizes the aforesaid principles to produce outcomes like MD2, MD5, SHA-160, SHA-224/256,…
read more here.
Keywords:
provably secure;
polynomial function;
sha;
hash function ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2017 at "Translational Animal Science"
DOI: 10.2527/tas2017-0016
Abstract: Abstract The objectives of this research were to quantify and model daily feed intakes to 28 d of lactation in modern sows. A total of 4,512 daily feed intake (DFI) records were collected for 156…
read more here.
Keywords:
polynomial function;
three groups;
random effects;
feed intakes ... See more keywords