Results 101 to 110 of about 45,527 (206)

An Enhanced Non-Cryptographic Hash Function

open access: yesInternational Journal of Computer Applications, 2020
Steve Okyere-Gyamfi   +2 more
openaire   +1 more source

Non-Cryptographic Hash Functions: Focus on FNV

open access: yes, 2023
In this thesis, we will explore the world of hash functions. After a brief overview of the construction and uses of cryptographic hashes, we will then focus almost exclusively on non-cryptographic functions. We delve into the FNV family of hash functions in significant detail, examining their background, structure and motivation. We then introduce some
openaire   +1 more source

Cryptographic hash function SafeBK

open access: yesUkrainian Scientific Journal of Information Security, 2017
openaire   +1 more source

Cryptanalysis of Dedicated Cryptographic Hash Functions

open access: yes, 2009
In this thesis we study the security of a number of dedicated cryptographic hash functions against cryptanalytic attacks. We begin with an introduction to what cryptographic hash functions are and what they are used for. This is followed by strict definitions of the security properties often required from cryptographic hash functions.
openaire   +1 more source

Home - About - Disclaimer - Privacy