Results 151 to 160 of about 45,527 (206)
Some of the next articles are maybe not open access.
Troika: a ternary cryptographic hash function
Designs, Codes and Cryptography, 2019zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Kölbl, Stefan +3 more
openaire +3 more sources
Different Cryptographic Hash Functions for Security in the Blockchain
2023 International Conference on Data Science and Network Security (ICDSNS), 2023In day-to-day life, everyone is concerned about their security and privacy, and their concern becomes more when it comes to transactions. The technology behind blockchain is quite young.
Dhramandra Sharma, Monika Saxena
semanticscholar +1 more source
Cellular Automata Based Hashing Algorithm (CABHA) for Strong Cryptographic Hash Function
IEEE International Conference on Electrical, Computer and Communication Technologies, 2019Cryptographic hash functions play a crucial role in information security. Cryptographic hash functions are used in various cryptographic applications to verify the message authenticity and integrity.
Kartik Rajeshwaran, Kakelli Anil Kumar
semanticscholar +1 more source
INTERNATIONALLY STANDARDIZED EFFICIENT CRYPTOGRAPHIC HASH FUNCTION
Proceedings of the International Conference on Security and Cryptography, 2011D. Gligoroski +3 more
openaire +2 more sources
Cryptographic Hash Functions [PDF]
Kryptografiske hashfunktioner anvendes i mange forskellige områder inden for kryptografi: i digitale signatursystemer og i såkaldt public‐key kryptografi, til passwordbeskyttelse og autentificering af beskeder, til dannelse af kryptografiske nøgler og tilfældige tal, osv.
openaire +2 more sources
Novel Non-cryptographic Hash Functions for Networking and Security Applications on FPGA
Euromicro Symposium on Digital Systems Design, 2021This paper proposes the design and FPGA implementation of five novel non-cryptographic hash functions, that are suitable to be used in networking and security applications that require fast lookup and/or counting architectures.
Thomas Claesen +3 more
semanticscholar +1 more source
Cryptographic Hash Functions from Expander Graphs
Journal of Cryptology, 2007zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Charles, Denis X. +2 more
openaire +2 more sources
Requirements for cryptographic hash functions
Computers & Security, 1992We give a comprehensive discussion of and structure for the quality requirements good cryptographic hash functions should fulfil. Functional requirements like contraction of the input and fast calculation are ordered by priority in the algorithm design and implementation process.
Fritz Bauspiess, Frank Damm
openaire +1 more source
2015
Cryptographic hash function verifies data integrity and sender identity or source of information. The task is accomplished by taking a variable bit patterns as an input then produces a fixed bit patterns of output. This chapter provides a detailed overview to include classification, properties, constructions, attacks, applications and an overview of a ...
Imad Fakhri Alshaikhli +1 more
openaire +1 more source
Cryptographic hash function verifies data integrity and sender identity or source of information. The task is accomplished by taking a variable bit patterns as an input then produces a fixed bit patterns of output. This chapter provides a detailed overview to include classification, properties, constructions, attacks, applications and an overview of a ...
Imad Fakhri Alshaikhli +1 more
openaire +1 more source
European Transactions on Telecommunications, 1994
AbstractHash functions were introduced in cryptology in the late seventies as a tool to protect the authenticity of information. Soon it became clear that they were a very useful building block to solve other security problems in telecommunication and computer networks.
openaire +1 more source
AbstractHash functions were introduced in cryptology in the late seventies as a tool to protect the authenticity of information. Soon it became clear that they were a very useful building block to solve other security problems in telecommunication and computer networks.
openaire +1 more source

