Results 211 to 220 of about 555,076 (261)
Some of the next articles are maybe not open access.
VLSI Characterization of the Cryptographic Hash Function BLAKE
IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 2011Cryptographic hash functions are used to protect information integrity and authenticity in a wide range of applications. After the discovery of weaknesses in the current deployed standards, the U.S. Institute of Standards and Technology started a public competition to develop the future standard SHA-3, which will be implemented in a multitude of ...
Willi Meier+3 more
openaire +3 more sources
Cellular Automata Based Hashing Algorithm (CABHA) for Strong Cryptographic Hash Function
IEEE International Conference on Electrical, Computer and Communication Technologies, 2019Cryptographic hash functions play a crucial role in information security. Cryptographic hash functions are used in various cryptographic applications to verify the message authenticity and integrity.
Kartik Rajeshwaran, Kakelli Anil Kumar
semanticscholar +1 more source
Evolution of Non-Cryptographic Hash Function Pairs for FPGA-Based Network Applications
IEEE Symposium Series on Computational Intelligence, 2015High-speed computer networks require rapid packet processing and flexibility which can be ensured by implementing network applications in field programmable gate arrays (FPGAs). Many network applications are based on fast lookup in hash tables.
R. Dobai, J. Korenek
semanticscholar +1 more source
A Lightweight Hash Function for Cryptographic and Pseudo-Cryptographic Applications
2021In this paper, we design a lightweight hash function suitable for fast applications. The proposed hash function is intended to be used as a secondary component in cryptographic and pseudo-cryptographic applications (e.g., pseudorandom number generators, cryptosystems), where the required property is the fastness in addition to an acceptable security ...
Imad El Hanouti+3 more
openaire +2 more sources
Requirements for cryptographic hash functions
Computers & Security, 1992We give a comprehensive discussion of and structure for the quality requirements good cryptographic hash functions should fulfil. Functional requirements like contraction of the input and fast calculation are ordered by priority in the algorithm design and implementation process.
Frank Damm, Fritz Bauspiess
openaire +2 more sources
High Speed FPGA Implementation of Cryptographic KECCAK Hash Function Crypto-Processor
J. Circuits Syst. Comput., 2016Cryptographic hash functions are at the heart of many information security applications like message authentication codes (MACs), digital signatures and other forms of authentication.
Fatma Kahri+3 more
semanticscholar +1 more source
Cryptographic Hash Functions [PDF]
In this chapter, we discuss cryptographic hash functions. They are used, for example, in digital signatures. Throughout this chapter, we assume that Σ is an alphabet.
openaire +1 more source
The NIST Cryptographic Workshop on Hash Functions
IEEE Security & Privacy Magazine, 2006In light of recent breakthroughs on the cryptanalysis of hash functions, the US National Institute for Standards and Technology (NIST) organized a workshop to solicit input on the current status of the Secure Hash Algorithm-1 (SHA-1) family of hash functions.
Nicolas Sklavos+2 more
openaire +2 more sources
European Transactions on Telecommunications, 1994
AbstractHash functions were introduced in cryptology in the late seventies as a tool to protect the authenticity of information. Soon it became clear that they were a very useful building block to solve other security problems in telecommunication and computer networks.
openaire +2 more sources
AbstractHash functions were introduced in cryptology in the late seventies as a tool to protect the authenticity of information. Soon it became clear that they were a very useful building block to solve other security problems in telecommunication and computer networks.
openaire +2 more sources
A Fast New Cryptographic Hash Function Based on Integer Tent Mapping System
Journal of Computers, 2012This paper proposes a novel one-way Hash function which is based on the Coupled Integer Tent Mapping System and termed as THA (THA-160, THA-256). The THA-160 compresses a message of arbitrary length into a fingerprint of 160 bits, well the THA-256 ...
Jiandong Liu+3 more
semanticscholar +1 more source