Results 201 to 210 of about 75,969 (261)

Hash-One: a lightweight cryptographic hash function

open access: yesIET Information Security, 2016
The increased demand for lightweight applications has triggered the need for appropriate security mechanisms in them. Lightweight cryptographic hash functions are among the major responses toward such a requirement.
Puliparambil Megha Mukundan   +3 more
semanticscholar   +3 more sources

Troika: a ternary cryptographic hash function

Designs, Codes and Cryptography, 2019
Linear codes over finite fields are one of the most well-studied areas in coding theory. While codes over finite fields of characteristic two are of particular practical interest due to their good implementation properties, ternary codes have been extensively studied as well.
Stefan Kölbl   +3 more
semanticscholar   +3 more sources

Different Cryptographic Hash Functions for Security in the Blockchain

2023 International Conference on Data Science and Network Security (ICDSNS), 2023
In day-to-day life, everyone is concerned about their security and privacy, and their concern becomes more when it comes to transactions. The technology behind blockchain is quite young.
Dhramandra Sharma, Monika Saxena
semanticscholar   +1 more source

Novel Non-cryptographic Hash Functions for Networking and Security Applications on FPGA

Euromicro Symposium on Digital Systems Design, 2021
This paper proposes the design and FPGA implementation of five novel non-cryptographic hash functions, that are suitable to be used in networking and security applications that require fast lookup and/or counting architectures.
Thomas Claesen   +3 more
semanticscholar   +1 more source

Cellular Automata Based Hashing Algorithm (CABHA) for Strong Cryptographic Hash Function

IEEE International Conference on Electrical, Computer and Communication Technologies, 2019
Cryptographic hash functions play a crucial role in information security. Cryptographic hash functions are used in various cryptographic applications to verify the message authenticity and integrity.
Kartik Rajeshwaran, Kakelli Anil Kumar
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy