Results 131 to 140 of about 75,969 (261)
Adaptive Restart and CEGAR-based Solver for Inverting Cryptographic Hash Functions
Saeed Nejati+4 more
openalex +2 more sources
Cryptographic Hash Functions in Groups and Provable Properties
We consider several "provably secure" hash functions that compute simple sums in a well chosen group (G,*). Security properties of such functions provably translate in a natural way to computational problems in G that are simple to define and possibly also hard to solve.
openaire +2 more sources
Improved 2-round collision attack on IoT hash standard ASCON-HASH
Lightweight cryptography algorithms are a class of ciphers designed to protect data generated and transmitted by the Internet of Things. They typically have low requirements in terms of storage space and power consumption, and are well-suited for ...
Di Zhai+4 more
doaj
S-HASH: A Crack Towards Cryptographic Hash Functions
Kaushal Jangid, Vidushi
openalex +2 more sources
Analysis of cryptographic hash functions
The National Institute of Standards and Technology (NIST) launched in 2008 a public competition, called the SHA-3 competition, aiming at definining a new standard for hash functions. We study here the algebraic properties of some of the candidates to this contest. Among the functions analyzed, is the Keccak algorithm, which was recently announced to be
openaire +1 more source
Scanning and Detection of virus using cryptographic hash function
O Himgouri+4 more
openalex +1 more source
Automated Creation of Source Code Variants of a Cryptographic Hash Function Implementation Using Generative Pre-Trained Transformer Models [PDF]
Elijah Pelofske+2 more
openalex +1 more source
Enhanced image hash using cellular automata with sponge construction and elliptic curve cryptography for secure image transaction. [PDF]
Ibrahim MM+6 more
europepmc +1 more source