Results 131 to 140 of about 38,362 (243)
Analysis of cryptographic hash functions
The National Institute of Standards and Technology (NIST) launched in 2008 a public competition, called the SHA-3 competition, aiming at definining a new standard for hash functions. We study here the algebraic properties of some of the candidates to this contest. Among the functions analyzed, is the Keccak algorithm, which was recently announced to be
openaire +1 more source
Adaptive Restart and CEGAR-based Solver for Inverting Cryptographic Hash Functions
Saeed Nejati+4 more
openalex +2 more sources
Cryptographic Hash Functions in Groups and Provable Properties
We consider several "provably secure" hash functions that compute simple sums in a well chosen group (G,*). Security properties of such functions provably translate in a natural way to computational problems in G that are simple to define and possibly also hard to solve.
openaire +2 more sources
Chaotic systems have been widely employed in constructing hash functions because of their nonlinear characteristics. Nonetheless, some chaotic hash functions are intricately designed, significantly increasing their computational overhead, and some can ...
Hao Xing+4 more
doaj +1 more source
S-HASH: A Crack Towards Cryptographic Hash Functions
Kaushal Jangid, Vidushi
openalex +2 more sources
Scanning and Detection of virus using cryptographic hash function
O Himgouri+4 more
openalex +1 more source
Automated Creation of Source Code Variants of a Cryptographic Hash Function Implementation Using Generative Pre-Trained Transformer Models [PDF]
Elijah Pelofske+2 more
openalex +1 more source
Post-Quantum enhanced Ascon for secure vehicular IoT data integrity. [PDF]
A J B, P K, R K, R M.
europepmc +1 more source
Enhancing confidentiality and access control in electronic health record systems using a hybrid hashing blockchain framework. [PDF]
Chakravarthy DG+3 more
europepmc +1 more source