Results 131 to 140 of about 75,969 (261)

Adaptive Restart and CEGAR-based Solver for Inverting Cryptographic Hash Functions

open access: green, 2016
Saeed Nejati   +4 more
openalex   +2 more sources

Cryptographic Hash Functions in Groups and Provable Properties

open access: yes, 2011
We consider several "provably secure" hash functions that compute simple sums in a well chosen group (G,*). Security properties of such functions provably translate in a natural way to computational problems in G that are simple to define and possibly also hard to solve.
openaire   +2 more sources

Improved 2-round collision attack on IoT hash standard ASCON-HASH

open access: yesHeliyon
Lightweight cryptography algorithms are a class of ciphers designed to protect data generated and transmitted by the Internet of Things. They typically have low requirements in terms of storage space and power consumption, and are well-suited for ...
Di Zhai   +4 more
doaj  

Analysis of cryptographic hash functions

open access: yes, 2012
The National Institute of Standards and Technology (NIST) launched in 2008 a public competition, called the SHA-3 competition, aiming at definining a new standard for hash functions. We study here the algebraic properties of some of the candidates to this contest. Among the functions analyzed, is the Keccak algorithm, which was recently announced to be
openaire   +1 more source

Scanning and Detection of virus using cryptographic hash function

open access: bronze, 2023
O Himgouri   +4 more
openalex   +1 more source

Home - About - Disclaimer - Privacy