Results 11 to 20 of about 38,860 (244)
Anti-disassembly using Cryptographic Hash Functions [PDF]
Computer viruses sometimes employ coding techniques intended to make analysis difficult for anti-virus researchers; techniques to obscure code to impair static code analysis are called anti-disassembly techniques. We present a new method of anti-disassembly based on cryptographic hash functions which is portable, hard to analyze, and can be used to ...
John Aycock +2 more
openalex +3 more sources
Analysis of the cryptographic strength of the SHA-256 hash function using the SAT approach
Cryptographic hash functions play a significant role in modern information security systems by ensuring data integrity and enabling efficient data compression. One of the most important and widely used cryptographic hash functions is SHA-256 that belongs
V. V. Davydov +3 more
doaj +2 more sources
A Family of Fast Syndrome Based Cryptographic Hash Functions [PDF]
Recently, some collisions have been exposed for a variety of cryptographic hash functions~\cite{WFLY04} including some of the most widely used today. Many other hash functions using similar constrcutions can however still be considered secure. Nevertheless, this has drawn attention on the need for new hash function designs. In this article is presented
Daniel Augot +2 more
openalex +5 more sources
Cryptographic Hash Function using Cellular Automata [PDF]
Since two distinct messages are extremely unlikely to generate identical message digests, one can use this property of cryptographic hash functions to detect when a message has been altered. If one takes a binary file and computes a digest of the file, one can record this baseline digest. In the future, the digest can be recomputed on the file.
Mohamed Mahmoud ElRakaib
openalex +2 more sources
Cryptographic Hash Functions from Expander Graphs [PDF]
We propose constructing provable collision resistant hash functions from expander graphs in which finding cycles is hard. As examples, we investigate two specific families of optimal expander graphs for provable collision resistant hash function constructions: the families of Ramanujan graphs constructed by Lubotzky-Phillips-Sarnak and Pizer ...
Denis Charles +2 more
openalex +3 more sources
A Survey: Cryptographic Hash Functions for Digital Stamping
The current study aims to examine a general overview of the application of hash functions in cryptography and study the relationships between cryptographic hash functions and uses of the digital signature. Functions of the cryptographic hash are an important tool applied in several sections of data security, and application of hash function is common ...
Israa Ezzat Salem +2 more
openalex +3 more sources
An Enhanced Non-Cryptographic Hash Function
Vivian Akoto-Adjepong +2 more
openalex +3 more sources
Lightweight Cryptographic Hash Functions: Design Trends, Comparative Study, and Future Directions
The emergence of the Internet of Things (IoT) has enabled billions of devices that collect large amounts of data to be connected. Therefore, IoT security has fundamental requirements. One critical aspect of IoT security is data integrity.
Susila Windarta +4 more
doaj +1 more source
Hash Algorithm In Verification Of Certificate Data Integrity And Security
The hash function is the most important cryptographic primitive function and is an integral part of the blockchain data structure. Hashes are often used in cryptographic protocols, information security applications such as Digital Signatures and message ...
Muhammad Rehan Anwar +2 more
doaj +1 more source
Implementation and Optimization of Zero-Knowledge Proof Circuit Based on Hash Function SM3
With the increasing demand for privacy protection in the blockchain, the universal zero-knowledge proof protocol has been developed and widely used. Because hash function is an important cryptographic primitive in a blockchain, the zero-knowledge proof ...
Yang Yang +7 more
doaj +1 more source

