Weibo Pan

Learn More
—Hash functions are widely used in, and form an important part of many cryptographic protocols. Currently, a public competition is underway to find a new hash algorithm(s) for inclusion in the NIST Secure Hash Standard (SHA-3). Computational efficiency of the algorithms in hardware will form one of the evaluation criteria. In this paper, we focus on five of(More)
It is known that commutative BCK-algebras form a variety, but BCK-algebras do not [4]. Therefore H. Yutani introduced the notion of quasi-commutative BCK-algebras. In this article we first present the notion and general theory of quasi-commutative BCI-algebras. Then we discuss the reduction of the type of quasi-commutative BCK-algebras and some special(More)
  • 1