Results 11 to 20 of about 38,860 (244)

Anti-disassembly using Cryptographic Hash Functions [PDF]

open access: greenJournal in Computer Virology, 2006
Computer viruses sometimes employ coding techniques intended to make analysis difficult for anti-virus researchers; techniques to obscure code to impair static code analysis are called anti-disassembly techniques. We present a new method of anti-disassembly based on cryptographic hash functions which is portable, hard to analyze, and can be used to ...
John Aycock   +2 more
openalex   +3 more sources

Analysis of the cryptographic strength of the SHA-256 hash function using the SAT approach

open access: diamondНаучно-технический вестник информационных технологий, механики и оптики
Cryptographic hash functions play a significant role in modern information security systems by ensuring data integrity and enabling efficient data compression. One of the most important and widely used cryptographic hash functions is SHA-256 that belongs
V. V. Davydov   +3 more
doaj   +2 more sources

A Family of Fast Syndrome Based Cryptographic Hash Functions [PDF]

open access: green, 2005
Recently, some collisions have been exposed for a variety of cryptographic hash functions~\cite{WFLY04} including some of the most widely used today. Many other hash functions using similar constrcutions can however still be considered secure. Nevertheless, this has drawn attention on the need for new hash function designs. In this article is presented
Daniel Augot   +2 more
openalex   +5 more sources

Cryptographic Hash Function using Cellular Automata [PDF]

open access: bronzeInternational Journal of Computer Applications Technology and Research, 2016
Since two distinct messages are extremely unlikely to generate identical message digests, one can use this property of cryptographic hash functions to detect when a message has been altered. If one takes a binary file and computes a digest of the file, one can record this baseline digest. In the future, the digest can be recomputed on the file.
Mohamed Mahmoud ElRakaib
openalex   +2 more sources

Cryptographic Hash Functions from Expander Graphs [PDF]

open access: bronzeJournal of Cryptology, 2007
We propose constructing provable collision resistant hash functions from expander graphs in which finding cycles is hard. As examples, we investigate two specific families of optimal expander graphs for provable collision resistant hash function constructions: the families of Ramanujan graphs constructed by Lubotzky-Phillips-Sarnak and Pizer ...
Denis Charles   +2 more
openalex   +3 more sources

A Survey: Cryptographic Hash Functions for Digital Stamping

open access: bronzeJournal of Southwest Jiaotong University, 2019
The current study aims to examine a general overview of the application of hash functions in cryptography and study the relationships between cryptographic hash functions and uses of the digital signature. Functions of the cryptographic hash are an important tool applied in several sections of data security, and application of hash function is common ...
Israa Ezzat Salem   +2 more
openalex   +3 more sources

An Enhanced Non-Cryptographic Hash Function

open access: goldInternational Journal of Computer Applications, 2020
Vivian Akoto-Adjepong   +2 more
openalex   +3 more sources

Lightweight Cryptographic Hash Functions: Design Trends, Comparative Study, and Future Directions

open access: yesIEEE Access, 2022
The emergence of the Internet of Things (IoT) has enabled billions of devices that collect large amounts of data to be connected. Therefore, IoT security has fundamental requirements. One critical aspect of IoT security is data integrity.
Susila Windarta   +4 more
doaj   +1 more source

Hash Algorithm In Verification Of Certificate Data Integrity And Security

open access: yesAptisi Transactions on Technopreneurship, 2021
The hash function is the most important cryptographic primitive function and is an integral part of the blockchain data structure. Hashes are often used in cryptographic protocols, information security applications such as Digital Signatures and message ...
Muhammad Rehan Anwar   +2 more
doaj   +1 more source

Implementation and Optimization of Zero-Knowledge Proof Circuit Based on Hash Function SM3

open access: yesSensors, 2022
With the increasing demand for privacy protection in the blockchain, the universal zero-knowledge proof protocol has been developed and widely used. Because hash function is an important cryptographic primitive in a blockchain, the zero-knowledge proof ...
Yang Yang   +7 more
doaj   +1 more source

Home - About - Disclaimer - Privacy