Results 161 to 170 of about 45,527 (206)
Some of the next articles are maybe not open access.
2020
Don't get intimidated by the title of this chapter. The theory of cryptographic hash functions is not particularly abstruse. What is difficult is the construction of these functions from scratch. However, we need not concern ourselves with this aspect of the mathematical theory since most programming language libraries provide us with a good selection ...
openaire +1 more source
Don't get intimidated by the title of this chapter. The theory of cryptographic hash functions is not particularly abstruse. What is difficult is the construction of these functions from scratch. However, we need not concern ourselves with this aspect of the mathematical theory since most programming language libraries provide us with a good selection ...
openaire +1 more source
Cryptographic Keyed Hash Function: PARAŚU-256
Journal of Computational and Theoretical Nanoscience, 2020Cryptography has distinct paramount significance in interconnected environment where whether we concern about ‘Computer-Security,’ ‘Information-Security,’ ‘Network-Security’ etc., doesn’t matters and, ingredients of this particular branch of computer science viz. ‘Encryption/Decryption’ systems, ‘Hash-Functions,’ ‘Digital-Signatures’ etc. also playing
Arvind K. Sharma, Sudesh K. Mittal
openaire +1 more source
Cryptographic Hash Functions For Digital Stamping
Advances in Multidisciplinary and scientific Research Journal Publication, 2022The current study's objectives are to analyze a broad overview of hash function applications in cryptography and investigate the connections between digital signature applications and cryptographic hash functions. Applications of the hash function are widespread and used for a variety of purposes, including password hashing, file integrity verification,
openaire +1 more source
2001
In this chapter, we discuss cryptographic hash functions. They are used, for example, in digital signatures. Throughout this chapter, we assume that Σ is an alphabet.
openaire +1 more source
In this chapter, we discuss cryptographic hash functions. They are used, for example, in digital signatures. Throughout this chapter, we assume that Σ is an alphabet.
openaire +1 more source
A Lightweight Hash Function for Cryptographic and Pseudo-Cryptographic Applications
2021In this paper, we design a lightweight hash function suitable for fast applications. The proposed hash function is intended to be used as a secondary component in cryptographic and pseudo-cryptographic applications (e.g., pseudorandom number generators, cryptosystems), where the required property is the fastness in addition to an acceptable security ...
Imad El Hanouti +3 more
openaire +1 more source
Integrated-Key Cryptographic Hash Functions [PDF]
Cryptographic hash functions have always played a major role in most cryptographic applications. Traditionally, hash functions were designed in the keyless setting, where a hash function accepts a variable-length message and returns a fixed-length fingerprint.
openaire +1 more source
The NIST Cryptographic Workshop on Hash Functions
IEEE Security & Privacy Magazine, 2006In light of recent breakthroughs on the cryptanalysis of hash functions, the US National Institute for Standards and Technology (NIST) organized a workshop to solicit input on the current status of the Secure Hash Algorithm-1 (SHA-1) family of hash functions.
C. Rechberger, V. Rijmen, N. Sklavos
openaire +1 more source
Does Fiat-Shamir Require a Cryptographic Hash Function?
IACR Cryptology ePrint Archive, 2020Yilei Chen +3 more
semanticscholar +1 more source
A quantum hash function with grouped coarse-grained boson sampling
Quantum Information Processing, 2022Jinjing Shi +6 more
semanticscholar +1 more source
A low-area unified hardware architecture for the AES and the cryptographic hash function Grøstl
J. Parallel Distributed Comput., 2017Nuray At +4 more
semanticscholar +1 more source

