Results 1 to 10 of about 552,535 (268)
Whirlwind: a new cryptographic hash function [PDF]
A new cryptographic hash function Whirlwind is presented. We give the full specification and explain the design rationale. We show how the hash function can be implemented efficiently in software and give first performance numbers. A detailed analysis of the security against state-of-the-art cryptanalysis methods is also provided.
Paulo S. L. M. Barreto+4 more
core +8 more sources
Finding Bugs in Cryptographic Hash Function Implementations. [PDF]
Cryptographic hash functions are security-critical algorithms with many practical applications, notably in digital signatures. Developing an approach to test them can be particularly difficult, and bugs can remain unnoticed for many years. We revisit the NIST hash function competition, which was used to develop the SHA-3 standard, and apply a new ...
Mouha N, Raunak MS, Kuhn DR, Kacker R.
europepmc +4 more sources
Verification of Implementations of Cryptographic Hash Functions
Cryptographic hash functions have become the basis of modern network computing for identity authorization and secure computing; protocol consistency of cryptographic hash functions is one of the most important properties that affect the security and ...
Dexi Wang+5 more
doaj +4 more sources
Merkle-Damgård Construction Method and Alternatives: A Review [PDF]
Cryptographic hash function is an important cryptographic tool in the field of information security. Design of most widely used hash functions such as MD5 and SHA-1 is based on the iterations of compression function by Merkle-Damgård construction method ...
Harshvardhan Tiwari
doaj +3 more sources
Adaptive Restart and CEGAR-based Solver for Inverting Cryptographic Hash Functions [PDF]
SAT solvers are increasingly being used for cryptanalysis of hash functions and symmetric encryption schemes. Inspired by this trend, we present MapleCrypt which is a SAT solver-based cryptanalysis tool for inverting hash functions. We reduce the hash function inversion problem for fixed targets into the satisfiability problem for Boolean logic, and ...
Saeed Nejati+4 more
arxiv +3 more sources
low complexity cryptographic hash functions [PDF]
Cryptographic hash functions are efficiently computable functions that shrink a long input into a shorter output while achieving some of the useful security properties of a random function. The most common type of such hash functions is collision resistant hash functions (CRH), which prevent an efficient attacker from finding a pair of inputs on which
Applebaum, Benny+4 more
openaire +6 more sources
Regular and almost universal hashing: an efficient implementation [PDF]
Random hashing can provide guarantees regarding the performance of data structures such as hash tables---even in an adversarial setting. Many existing families of hash functions are universal: given two data objects, the probability that they have the same hash value is low given that we pick hash functions at random.
Ignatchenko, Sergey+2 more
arxiv +4 more sources
An Efficient Construction of a Compression Function for Cryptographic Hash [PDF]
A cryptographic hash $$\left( \text {CH}\right) $$ is an algorithm that invokes an arbitrary domain of the message and returns fixed size of an output. The numbers of application of cryptographic hash are enormous such as message integrity, password verification, and pseudorandom generation.
Rashed Mazumder+2 more
openalex +4 more sources
Theoretical and Experimental Analysis of Cryptographic Hash Functions [PDF]
The paper presents a theoretical introduction to the cryptographic hash function theory and a statistical experimental analysis of selected hash functions.
Jacek Tchórzewsk+1 more
doaj +2 more sources
A secure and efficient cryptographic hash function based on NewFORK-256
Cryptographic hash functions serve as a fundamental building block of information security and are used in numerous security applications and protocols such as digital signature schemes, construction of MAC and random number generation, for ensuring data
Harshvardhan Tiwari, Krishna Asawa
doaj +2 more sources