Results 1 to 10 of about 38,362 (243)

Whirlwind: a new cryptographic hash function [PDF]

open access: hybridDesigns, Codes and Cryptography, 2010
A new cryptographic hash function Whirlwind is presented. We give the full specification and explain the design rationale. We show how the hash function can be implemented efficiently in software and give first performance numbers. A detailed analysis of
Barreto, Paulo   +4 more
core   +7 more sources

Verification of Implementations of Cryptographic Hash Functions

open access: goldIEEE Access, 2017
Cryptographic hash functions have become the basis of modern network computing for identity authorization and secure computing; protocol consistency of cryptographic hash functions is one of the most important properties that affect the security and ...
Dexi Wang   +5 more
doaj   +4 more sources

Finding Bugs in Cryptographic Hash Function Implementations. [PDF]

open access: bronzeIEEE Trans Reliab, 2018
Cryptographic hash functions are security-critical algorithms with many practical applications, notably in digital signatures. Developing an approach to test them can be particularly difficult, and bugs can remain unnoticed for many years. We revisit the NIST hash function competition, which was used to develop the SHA-3 standard, and apply a new ...
Mouha N, Raunak MS, Kuhn DR, Kacker R.
europepmc   +4 more sources

A secure and efficient cryptographic hash function based on NewFORK-256

open access: goldEgyptian Informatics Journal, 2012
Cryptographic hash functions serve as a fundamental building block of information security and are used in numerous security applications and protocols such as digital signature schemes, construction of MAC and random number generation, for ensuring data
Harshvardhan Tiwari, Krishna Asawa
doaj   +2 more sources

Secure Parallel Image Cryptographic Hash Function Using a Novel 2D High-Randomness Hyperchaotic Map

open access: goldMathematics
For image data, the processing of each pixel using a cryptographic hash function is linear, and the existing cryptographic hash function lacks parallel processing of image width and height.
Mingrui Qi, Dongdong Wang
doaj   +2 more sources

Analysis and implementation of cryptographic hash functions in programmable logic devices / Kriptografinių maišos funkcijų įgyvendinimo programuojamosios logikos lustuose tyrimas

open access: diamondMokslas: Lietuvos Ateitis, 2016
In this day’s world, more and more focused on data protection. For data protection using cryptographic science. It is also important for the safe storage of passwords for this uses a cryptographic hash function.
Tautvydas Brukštus
doaj   +3 more sources

Key derivation function: key-hash based computational extractor and stream based pseudorandom expander [PDF]

open access: yesPeerJ Computer Science
The key derivation function is a specific cryptographic algorithm that transforms private string and public strings into one or more cryptographic keys.
Chai Wen Chuah   +2 more
doaj   +3 more sources

Lightweight Cryptographic Hash Functions: Design Trends, Comparative Study, and Future Directions

open access: yesIEEE Access, 2022
The emergence of the Internet of Things (IoT) has enabled billions of devices that collect large amounts of data to be connected. Therefore, IoT security has fundamental requirements. One critical aspect of IoT security is data integrity.
Susila Windarta   +4 more
doaj   +1 more source

Implementation and Optimization of Zero-Knowledge Proof Circuit Based on Hash Function SM3

open access: yesSensors, 2022
With the increasing demand for privacy protection in the blockchain, the universal zero-knowledge proof protocol has been developed and widely used. Because hash function is an important cryptographic primitive in a blockchain, the zero-knowledge proof ...
Yang Yang   +7 more
doaj   +1 more source

Home - About - Disclaimer - Privacy