Results 1 to 10 of about 552,535 (268)

Whirlwind: a new cryptographic hash function [PDF]

open access: hybridDesigns, Codes and Cryptography, 2010
A new cryptographic hash function Whirlwind is presented. We give the full specification and explain the design rationale. We show how the hash function can be implemented efficiently in software and give first performance numbers. A detailed analysis of the security against state-of-the-art cryptanalysis methods is also provided.
Paulo S. L. M. Barreto   +4 more
core   +8 more sources

Finding Bugs in Cryptographic Hash Function Implementations. [PDF]

open access: bronzeIEEE Trans Reliab, 2018
Cryptographic hash functions are security-critical algorithms with many practical applications, notably in digital signatures. Developing an approach to test them can be particularly difficult, and bugs can remain unnoticed for many years. We revisit the NIST hash function competition, which was used to develop the SHA-3 standard, and apply a new ...
Mouha N, Raunak MS, Kuhn DR, Kacker R.
europepmc   +4 more sources

Verification of Implementations of Cryptographic Hash Functions

open access: goldIEEE Access, 2017
Cryptographic hash functions have become the basis of modern network computing for identity authorization and secure computing; protocol consistency of cryptographic hash functions is one of the most important properties that affect the security and ...
Dexi Wang   +5 more
doaj   +4 more sources

Merkle-Damgård Construction Method and Alternatives: A Review [PDF]

open access: yesJournal of Information and Organizational Sciences, 2017
Cryptographic hash function is an important cryptographic tool in the field of information security. Design of most widely used hash functions such as MD5 and SHA-1 is based on the iterations of compression function by Merkle-Damgård construction method ...
Harshvardhan Tiwari
doaj   +3 more sources

Adaptive Restart and CEGAR-based Solver for Inverting Cryptographic Hash Functions [PDF]

open access: greenarXiv, 2016
SAT solvers are increasingly being used for cryptanalysis of hash functions and symmetric encryption schemes. Inspired by this trend, we present MapleCrypt which is a SAT solver-based cryptanalysis tool for inverting hash functions. We reduce the hash function inversion problem for fixed targets into the satisfiability problem for Boolean logic, and ...
Saeed Nejati   +4 more
arxiv   +3 more sources

low complexity cryptographic hash functions [PDF]

open access: yes8th Innovations in Theoretical Computer Science Conference (ITCS 2017), 2017
Cryptographic hash functions are efficiently computable functions that shrink a long input into a shorter output while achieving some of the useful security properties of a random function. The most common type of such hash functions is collision resistant hash functions (CRH), which prevent an efficient attacker from finding a pair of inputs on which
Applebaum, Benny   +4 more
openaire   +6 more sources

Regular and almost universal hashing: an efficient implementation [PDF]

open access: yesSoftware: Practice and Experience 47 (10), 2017, 2016
Random hashing can provide guarantees regarding the performance of data structures such as hash tables---even in an adversarial setting. Many existing families of hash functions are universal: given two data objects, the probability that they have the same hash value is low given that we pick hash functions at random.
Ignatchenko, Sergey   +2 more
arxiv   +4 more sources

An Efficient Construction of a Compression Function for Cryptographic Hash [PDF]

open access: green, 2016
A cryptographic hash $$\left( \text {CH}\right) $$ is an algorithm that invokes an arbitrary domain of the message and returns fixed size of an output. The numbers of application of cryptographic hash are enormous such as message integrity, password verification, and pseudorandom generation.
Rashed Mazumder   +2 more
openalex   +4 more sources

Theoretical and Experimental Analysis of Cryptographic Hash Functions [PDF]

open access: yesJournal of Telecommunications and Information Technology, 2019
The paper presents a theoretical introduction to the cryptographic hash function theory and a statistical experimental analysis of selected hash functions.
Jacek Tchórzewsk   +1 more
doaj   +2 more sources

A secure and efficient cryptographic hash function based on NewFORK-256

open access: goldEgyptian Informatics Journal, 2012
Cryptographic hash functions serve as a fundamental building block of information security and are used in numerous security applications and protocols such as digital signature schemes, construction of MAC and random number generation, for ensuring data
Harshvardhan Tiwari, Krishna Asawa
doaj   +2 more sources

Home - About - Disclaimer - Privacy