Results 131 to 140 of about 38,362 (243)

Analysis of cryptographic hash functions

open access: yes, 2012
The National Institute of Standards and Technology (NIST) launched in 2008 a public competition, called the SHA-3 competition, aiming at definining a new standard for hash functions. We study here the algebraic properties of some of the candidates to this contest. Among the functions analyzed, is the Keccak algorithm, which was recently announced to be
openaire   +1 more source

Adaptive Restart and CEGAR-based Solver for Inverting Cryptographic Hash Functions

open access: green, 2016
Saeed Nejati   +4 more
openalex   +2 more sources

Cryptographic Hash Functions in Groups and Provable Properties

open access: yes, 2011
We consider several "provably secure" hash functions that compute simple sums in a well chosen group (G,*). Security properties of such functions provably translate in a natural way to computational problems in G that are simple to define and possibly also hard to solve.
openaire   +2 more sources

Hyperchaotic hashing: a chaotic hash function based on 2D linear cross-coupled map with parallel feedback structure

open access: yesScientific Reports
Chaotic systems have been widely employed in constructing hash functions because of their nonlinear characteristics. Nonetheless, some chaotic hash functions are intricately designed, significantly increasing their computational overhead, and some can ...
Hao Xing   +4 more
doaj   +1 more source

Scanning and Detection of virus using cryptographic hash function

open access: bronze, 2023
O Himgouri   +4 more
openalex   +1 more source

Home - About - Disclaimer - Privacy