Results 171 to 180 of about 555,076 (261)

STITCH-256: A Dedicated Cryptographic Hash Function

open access: yesJournal of Applied Sciences, 2012
Ramlan Mahmod   +4 more
openaire   +2 more sources

Enhanced lightweight and compromised-resilient image encryption for resource constrained environments. [PDF]

open access: yesPLoS One
Mehmood A   +5 more
europepmc   +1 more source

Cryptanalysis of Dedicated Cryptographic Hash Functions

open access: yes, 2009
In this thesis we study the security of a number of dedicated cryptographic hash functions against cryptanalytic attacks. We begin with an introduction to what cryptographic hash functions are and what they are used for. This is followed by strict definitions of the security properties often required from cryptographic hash functions.
openaire   +1 more source

Home - About - Disclaimer - Privacy