Results 211 to 220 of about 555,076 (261)
Some of the next articles are maybe not open access.

VLSI Characterization of the Cryptographic Hash Function BLAKE

IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 2011
Cryptographic hash functions are used to protect information integrity and authenticity in a wide range of applications. After the discovery of weaknesses in the current deployed standards, the U.S. Institute of Standards and Technology started a public competition to develop the future standard SHA-3, which will be implemented in a multitude of ...
Willi Meier   +3 more
openaire   +3 more sources

Cellular Automata Based Hashing Algorithm (CABHA) for Strong Cryptographic Hash Function

IEEE International Conference on Electrical, Computer and Communication Technologies, 2019
Cryptographic hash functions play a crucial role in information security. Cryptographic hash functions are used in various cryptographic applications to verify the message authenticity and integrity.
Kartik Rajeshwaran, Kakelli Anil Kumar
semanticscholar   +1 more source

Evolution of Non-Cryptographic Hash Function Pairs for FPGA-Based Network Applications

IEEE Symposium Series on Computational Intelligence, 2015
High-speed computer networks require rapid packet processing and flexibility which can be ensured by implementing network applications in field programmable gate arrays (FPGAs). Many network applications are based on fast lookup in hash tables.
R. Dobai, J. Korenek
semanticscholar   +1 more source

A Lightweight Hash Function for Cryptographic and Pseudo-Cryptographic Applications

2021
In this paper, we design a lightweight hash function suitable for fast applications. The proposed hash function is intended to be used as a secondary component in cryptographic and pseudo-cryptographic applications (e.g., pseudorandom number generators, cryptosystems), where the required property is the fastness in addition to an acceptable security ...
Imad El Hanouti   +3 more
openaire   +2 more sources

Requirements for cryptographic hash functions

Computers & Security, 1992
We give a comprehensive discussion of and structure for the quality requirements good cryptographic hash functions should fulfil. Functional requirements like contraction of the input and fast calculation are ordered by priority in the algorithm design and implementation process.
Frank Damm, Fritz Bauspiess
openaire   +2 more sources

High Speed FPGA Implementation of Cryptographic KECCAK Hash Function Crypto-Processor

J. Circuits Syst. Comput., 2016
Cryptographic hash functions are at the heart of many information security applications like message authentication codes (MACs), digital signatures and other forms of authentication.
Fatma Kahri   +3 more
semanticscholar   +1 more source

Cryptographic Hash Functions [PDF]

open access: possible, 2001
In this chapter, we discuss cryptographic hash functions. They are used, for example, in digital signatures. Throughout this chapter, we assume that Σ is an alphabet.
openaire   +1 more source

The NIST Cryptographic Workshop on Hash Functions

IEEE Security & Privacy Magazine, 2006
In light of recent breakthroughs on the cryptanalysis of hash functions, the US National Institute for Standards and Technology (NIST) organized a workshop to solicit input on the current status of the Secure Hash Algorithm-1 (SHA-1) family of hash functions.
Nicolas Sklavos   +2 more
openaire   +2 more sources

Cryptographic hash functions

European Transactions on Telecommunications, 1994
AbstractHash functions were introduced in cryptology in the late seventies as a tool to protect the authenticity of information. Soon it became clear that they were a very useful building block to solve other security problems in telecommunication and computer networks.
openaire   +2 more sources

A Fast New Cryptographic Hash Function Based on Integer Tent Mapping System

Journal of Computers, 2012
This paper proposes a novel one-way Hash function which is based on the Coupled Integer Tent Mapping System and termed as THA (THA-160, THA-256). The THA-160 compresses a message of arbitrary length into a fingerprint of 160 bits, well the THA-256 ...
Jiandong Liu   +3 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy