Results 1 to 10 of about 572,172 (265)
Finding Bugs in Cryptographic Hash Function Implementations. [PDF]
IEEE Trans Reliab, 2018Cryptographic hash functions are security-critical algorithms with many practical applications, notably in digital signatures. Developing an approach to test them can be particularly difficult, and bugs can remain unnoticed for many years. We revisit the
Mouha N, Raunak MS, Kuhn DR, Kacker R.
europepmc +3 more sources
Whirlwind: a new cryptographic hash function [PDF]
Des. Codes Cryptogr., 2010A new cryptographic hash function Whirlwind is presented. We give the full specification and explain the design rationale. We show how the hash function can be implemented efficiently in software and give first performance numbers. A detailed analysis of
Barreto, Paulo+4 more
core +6 more sources
A secure and efficient cryptographic hash function based on NewFORK-256
Egyptian Informatics Journal, 2012Cryptographic hash functions serve as a fundamental building block of information security and are used in numerous security applications and protocols such as digital signature schemes, construction of MAC and random number generation, for ensuring data
Harshvardhan Tiwari, Krishna Asawa
doaj +3 more sources
Lightweight Cryptographic Hash Functions: Design Trends, Comparative Study, and Future Directions
IEEE Access, 2022The emergence of the Internet of Things (IoT) has enabled billions of devices that collect large amounts of data to be connected. Therefore, IoT security has fundamental requirements. One critical aspect of IoT security is data integrity.
Susila Windarta+4 more
doaj +2 more sources
Merkle-Damgård Construction Method and Alternatives: A Review [PDF]
Journal of Information and Organizational Sciences, 2017Cryptographic hash function is an important cryptographic tool in the field of information security. Design of most widely used hash functions such as MD5 and SHA-1 is based on the iterations of compression function by Merkle-Damgård construction method ...
Harshvardhan Tiwari
doaj +3 more sources
Journal of King Saud University: Computer and Information Sciences, 2020
Data Integrity is one of the primary concepts in information security. The main task of the cryptographic hash function is to assure the integrity of the transmitted data.
Mishal Almazrooie+5 more
doaj +2 more sources
Data Integrity is one of the primary concepts in information security. The main task of the cryptographic hash function is to assure the integrity of the transmitted data.
Mishal Almazrooie+5 more
doaj +2 more sources
Adaptive Restart and CEGAR-based Solver for Inverting Cryptographic Hash Functions [PDF]
arXiv, 2016SAT solvers are increasingly being used for cryptanalysis of hash functions and symmetric encryption schemes. Inspired by this trend, we present MapleCrypt which is a SAT solver-based cryptanalysis tool for inverting hash functions. We reduce the hash function inversion problem for fixed targets into the satisfiability problem for Boolean logic, and ...
Saeed Nejati+4 more
arxiv +3 more sources
Security Analysis of LNMNT-LightWeight Crypto Hash Function for IoT
IEEE Access, 2021Conventional cryptographic techniques are inappropriate for resource-constrained applications in the Internet of Things (IoT) domain because of their high resources requirement.
Nubila Nabeel+2 more
doaj +2 more sources
Regular and almost universal hashing: an efficient implementation [PDF]
Software: Practice and Experience 47 (10), 2017, 2016Random hashing can provide guarantees regarding the performance of data structures such as hash tables---even in an adversarial setting. Many existing families of hash functions are universal: given two data objects, the probability that they have the same hash value is low given that we pick hash functions at random.
Ignatchenko, Sergey+2 more
arxiv +4 more sources
Key derivation function: key-hash based computational extractor and stream based pseudorandom expander. [PDF]
PeerJ Comput SciThe key derivation function is a specific cryptographic algorithm that transforms private string and public strings into one or more cryptographic keys.
Chuah CW, Harun NZ, Hamid IRA.
europepmc +3 more sources