Results 11 to 20 of about 215,056 (305)

On the Collision Resistance of RIPEMD-160 [PDF]

open access: green, 2006
In this article, the RIPEMD-160 hash function is studied in detail. To analyze the hash function, we have extended existing approaches and used recent results in cryptanalysis. While RIPEMD and RIPEMD-128 reduced to 3 rounds are vulnerable to the attack, it is not feasible for RIPEMD-160.
Florian Mendel   +3 more
openalex   +3 more sources

A chaotic parallel hash engine with dynamic stochastic diffusion for blockchain and cloud security [PDF]

open access: yesScientific Reports
The design of cryptographic hash functions is crucial for ensuring the security of digital information. In this context, cellular automata (CAs) have emerged as a promising tool due to their inherent parallelism, determinism, and simplicity.
Qianyun Wang   +5 more
doaj   +2 more sources

Amplifying Collision Resistance: A Complexity-Theoretic Treatment [PDF]

open access: bronze, 2007
We initiate a complexity-theoretic treatment of hardness amplification for collision-resistant hash functions, namely the transformation of weakly collision-resistant hash functions into strongly collision-resistant ones in the standard model of computation. We measure the level of collision resistance by the maximum probability, over the choice of the
Ran Canetti   +5 more
openalex   +2 more sources

Distributional Collision Resistance Beyond One-Way Functions [PDF]

open access: green, 2021
A preliminary version appeared in Eurocrypt ...
Nir Bitansky   +3 more
openalex   +4 more sources

Robustness and Collision-Resistance of PhotoDNA

open access: diamondJournal of Cyber Security and Mobility
PhotoDNA is a widely utilized hash designed to counteract Child Sexual Abuse Material (CSAM). However, there has been a scarcity of detailed information regarding its performance. In this paper, we present a comprehensive analysis of its robustness and susceptibility to false positives, along with fundamental insights into its structure.
Martin Steinebach
openalex   +3 more sources

Analysis of the Collision Resistance of RadioGatúnUsing Algebraic Techniques [PDF]

open access: bronze, 2009
In this paper, we present some preliminary results on the security of the RadioGatun hash function. RadioGatu has an internal state of 58 words, and is parameterized by the word size, from one to 64 bits. We mostly study the one-bit version of RadioGatun since according to the authors, attacks on this version also affect the reasonably-sized versions ...
Charles Bouillaguet, Pierre-Alain Fouque
openalex   +3 more sources

A collision-resistant hashing algorithm for maintaining consistency in distributed NoSQL databases

open access: yesAdaptivni Sistemi Avtomatičnogo Upravlinnâ, 2022
The object of the research is the methods of ensuring consistency in distributed systems. Distributed systems allow you to use any service regardless of the user's geolocation while maintaining high performance.
В. Нікітін, Є. Крилов
doaj   +1 more source

Comparison of hashing methods for supporting consistency in distributed databases

open access: yesAdaptivni Sistemi Avtomatičnogo Upravlinnâ, 2022
The object of research is the methods of ensuring consistency in distributed systems. Distributed systems allow you to use any service regardless of the user's geolocation while maintaining high performance.
В. Нікітін, Є. Крилов
doaj   +1 more source

Analysis of the amplitude form of the quantum hash function

open access: yesУчёные записки Казанского университета: Серия Физико-математические науки, 2023
In this article, the properties of quantum hash functions are further explored. Previous findings show that so-called small-bias sets (special subsets of the set of elements of a cyclic group) generate a “phase” quantum hash function. Here, it was proved
M. F. Ablayev   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy