Results 171 to 180 of about 40,689 (200)
Some of the next articles are maybe not open access.

Cryptographic Hash Functions from Expander Graphs

Journal of Cryptology, 2007
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Charles, Denis X.   +2 more
openaire   +2 more sources

Requirements for cryptographic hash functions

Computers & Security, 1992
We give a comprehensive discussion of and structure for the quality requirements good cryptographic hash functions should fulfil. Functional requirements like contraction of the input and fast calculation are ordered by priority in the algorithm design and implementation process.
Fritz Bauspiess, Frank Damm
openaire   +1 more source

Cryptographic Hash Function

2015
Cryptographic hash function verifies data integrity and sender identity or source of information. The task is accomplished by taking a variable bit patterns as an input then produces a fixed bit patterns of output. This chapter provides a detailed overview to include classification, properties, constructions, attacks, applications and an overview of a ...
Imad Fakhri Alshaikhli   +1 more
openaire   +1 more source

Cryptographic hash functions

European Transactions on Telecommunications, 1994
AbstractHash functions were introduced in cryptology in the late seventies as a tool to protect the authenticity of information. Soon it became clear that they were a very useful building block to solve other security problems in telecommunication and computer networks.
openaire   +1 more source

Cryptographic Hash Functions

2020
Don't get intimidated by the title of this chapter. The theory of cryptographic hash functions is not particularly abstruse. What is difficult is the construction of these functions from scratch. However, we need not concern ourselves with this aspect of the mathematical theory since most programming language libraries provide us with a good selection ...
openaire   +1 more source

Cryptographic Keyed Hash Function: PARAŚU-256

Journal of Computational and Theoretical Nanoscience, 2020
Cryptography has distinct paramount significance in interconnected environment where whether we concern about ‘Computer-Security,’ ‘Information-Security,’ ‘Network-Security’ etc., doesn’t matters and, ingredients of this particular branch of computer science viz. ‘Encryption/Decryption’ systems, ‘Hash-Functions,’ ‘Digital-Signatures’ etc. also playing
Arvind K. Sharma, Sudesh K. Mittal
openaire   +1 more source

Cryptographic Hash Functions For Digital Stamping

Advances in Multidisciplinary and scientific Research Journal Publication, 2022
The current study's objectives are to analyze a broad overview of hash function applications in cryptography and investigate the connections between digital signature applications and cryptographic hash functions. Applications of the hash function are widespread and used for a variety of purposes, including password hashing, file integrity verification,
openaire   +1 more source

Cryptographic Hash Functions

2001
In this chapter, we discuss cryptographic hash functions. They are used, for example, in digital signatures. Throughout this chapter, we assume that Σ is an alphabet.
openaire   +1 more source

A Lightweight Hash Function for Cryptographic and Pseudo-Cryptographic Applications

2021
In this paper, we design a lightweight hash function suitable for fast applications. The proposed hash function is intended to be used as a secondary component in cryptographic and pseudo-cryptographic applications (e.g., pseudorandom number generators, cryptosystems), where the required property is the fastness in addition to an acceptable security ...
Imad El Hanouti   +3 more
openaire   +1 more source

Integrated-Key Cryptographic Hash Functions [PDF]

open access: possible, 2011
Cryptographic hash functions have always played a major role in most cryptographic applications. Traditionally, hash functions were designed in the keyless setting, where a hash function accepts a variable-length message and returns a fixed-length fingerprint.
openaire   +1 more source

Home - About - Disclaimer - Privacy