Results 151 to 160 of about 45,527 (206)
Some of the next articles are maybe not open access.

Troika: a ternary cryptographic hash function

Designs, Codes and Cryptography, 2019
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Kölbl, Stefan   +3 more
openaire   +3 more sources

Different Cryptographic Hash Functions for Security in the Blockchain

2023 International Conference on Data Science and Network Security (ICDSNS), 2023
In day-to-day life, everyone is concerned about their security and privacy, and their concern becomes more when it comes to transactions. The technology behind blockchain is quite young.
Dhramandra Sharma, Monika Saxena
semanticscholar   +1 more source

Cellular Automata Based Hashing Algorithm (CABHA) for Strong Cryptographic Hash Function

IEEE International Conference on Electrical, Computer and Communication Technologies, 2019
Cryptographic hash functions play a crucial role in information security. Cryptographic hash functions are used in various cryptographic applications to verify the message authenticity and integrity.
Kartik Rajeshwaran, Kakelli Anil Kumar
semanticscholar   +1 more source

INTERNATIONALLY STANDARDIZED EFFICIENT CRYPTOGRAPHIC HASH FUNCTION

Proceedings of the International Conference on Security and Cryptography, 2011
D. Gligoroski   +3 more
openaire   +2 more sources

Cryptographic Hash Functions [PDF]

open access: possible, 2009
Kryptografiske hashfunktioner anvendes i mange forskellige områder inden for kryptografi: i digitale signatursystemer og i såkaldt public‐key kryptografi, til passwordbeskyttelse og autentificering af beskeder, til dannelse af kryptografiske nøgler og tilfældige tal, osv.
openaire   +2 more sources

Novel Non-cryptographic Hash Functions for Networking and Security Applications on FPGA

Euromicro Symposium on Digital Systems Design, 2021
This paper proposes the design and FPGA implementation of five novel non-cryptographic hash functions, that are suitable to be used in networking and security applications that require fast lookup and/or counting architectures.
Thomas Claesen   +3 more
semanticscholar   +1 more source

Cryptographic Hash Functions from Expander Graphs

Journal of Cryptology, 2007
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Charles, Denis X.   +2 more
openaire   +2 more sources

Requirements for cryptographic hash functions

Computers & Security, 1992
We give a comprehensive discussion of and structure for the quality requirements good cryptographic hash functions should fulfil. Functional requirements like contraction of the input and fast calculation are ordered by priority in the algorithm design and implementation process.
Fritz Bauspiess, Frank Damm
openaire   +1 more source

Cryptographic Hash Function

2015
Cryptographic hash function verifies data integrity and sender identity or source of information. The task is accomplished by taking a variable bit patterns as an input then produces a fixed bit patterns of output. This chapter provides a detailed overview to include classification, properties, constructions, attacks, applications and an overview of a ...
Imad Fakhri Alshaikhli   +1 more
openaire   +1 more source

Cryptographic hash functions

European Transactions on Telecommunications, 1994
AbstractHash functions were introduced in cryptology in the late seventies as a tool to protect the authenticity of information. Soon it became clear that they were a very useful building block to solve other security problems in telecommunication and computer networks.
openaire   +1 more source

Home - About - Disclaimer - Privacy