Results 211 to 220 of about 75,969 (261)
Some of the next articles are maybe not open access.

Cryptographic Hash Function: A High Level View

2013 International Conference on Informatics and Creative Multimedia, 2013
Cryptographic hash function verifies data integrity and sender identity or source of information. The task is accomplished by taking a variable bit patterns as an input then produces a fixed bit patterns of output. This paper provides a detailed overview to include classification, properties, constructions, attacks, applications and an overview of a ...
Abdulaziz Ali Alkandari   +2 more
semanticscholar   +3 more sources

Requirements for cryptographic hash functions

Computers & Security, 1992
We give a comprehensive discussion of and structure for the quality requirements good cryptographic hash functions should fulfil. Functional requirements like contraction of the input and fast calculation are ordered by priority in the algorithm design and implementation process.
Frank Damm, Fritz Bauspiess
openaire   +2 more sources

A Lightweight Hash Function for Cryptographic and Pseudo-Cryptographic Applications

2021
In this paper, we design a lightweight hash function suitable for fast applications. The proposed hash function is intended to be used as a secondary component in cryptographic and pseudo-cryptographic applications (e.g., pseudorandom number generators, cryptosystems), where the required property is the fastness in addition to an acceptable security ...
Imad El Hanouti   +3 more
openaire   +2 more sources

VLSI Characterization of the Cryptographic Hash Function BLAKE

IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 2011
Cryptographic hash functions are used to protect information integrity and authenticity in a wide range of applications. After the discovery of weaknesses in the current deployed standards, the U.S. Institute of Standards and Technology started a public competition to develop the future standard SHA-3, which will be implemented in a multitude of ...
L. Henzen   +3 more
semanticscholar   +3 more sources

High Speed FPGA Implementation of Cryptographic KECCAK Hash Function Crypto-Processor

J. Circuits Syst. Comput., 2016
Cryptographic hash functions are at the heart of many information security applications like message authentication codes (MACs), digital signatures and other forms of authentication.
Fatma Kahri   +3 more
semanticscholar   +1 more source

Cryptographic Hash Functions [PDF]

open access: possible, 2001
In this chapter, we discuss cryptographic hash functions. They are used, for example, in digital signatures. Throughout this chapter, we assume that Σ is an alphabet.
openaire   +1 more source

Cryptographic hash functions

European Transactions on Telecommunications, 1994
AbstractHash functions were introduced in cryptology in the late seventies as a tool to protect the authenticity of information. Soon it became clear that they were a very useful building block to solve other security problems in telecommunication and computer networks.
openaire   +2 more sources

The NIST Cryptographic Workshop on Hash Functions

IEEE Security & Privacy Magazine, 2006
In light of recent breakthroughs on the cryptanalysis of hash functions, the US National Institute for Standards and Technology (NIST) organized a workshop to solicit input on the current status of the Secure Hash Algorithm-1 (SHA-1) family of hash functions.
Nicolas Sklavos   +2 more
openaire   +2 more sources

A Fast New Cryptographic Hash Function Based on Integer Tent Mapping System

Journal of Computers, 2012
This paper proposes a novel one-way Hash function which is based on the Coupled Integer Tent Mapping System and termed as THA (THA-160, THA-256). The THA-160 compresses a message of arbitrary length into a fingerprint of 160 bits, well the THA-256 ...
Jiandong Liu   +3 more
semanticscholar   +1 more source

Cryptographic Hash Functions

2020
Don't get intimidated by the title of this chapter. The theory of cryptographic hash functions is not particularly abstruse. What is difficult is the construction of these functions from scratch. However, we need not concern ourselves with this aspect of the mathematical theory since most programming language libraries provide us with a good selection ...
openaire   +2 more sources

Home - About - Disclaimer - Privacy