Results 221 to 230 of about 75,969 (261)
Some of the next articles are maybe not open access.

A Critical Look at Cryptographic Hash Function Literature

Coding and Cryptology, 2008
The cryptographic hash function literature has numerous hash function definitions and hash function requirements, and many of them disagree. This survey talks about the various definitions, and takes steps towards cleaning up the literature by explaining how the field has evolved and accurately depicting the research aims people have today.
Contini, Scott   +3 more
openaire   +3 more sources

Performance and Security Tradeoffs in Cryptographic Hash Functions

International Journal of Interdisciplinary Telecommunications and Networking, 2020
A cryptographic hash function is an important component used in many applications, such as blockchain, authentication, data integrity, and digital signature. With the rapid increase in usage of mobile devices, more attention goes towards the tradeoffs between performance and security of cryptographic hash functions on mobile devices due to their ...
Omar Mohammed Bawazeer   +1 more
openaire   +2 more sources

Cryptographic Keyed Hash Function: PARAŚU-256

Journal of Computational and Theoretical Nanoscience, 2020
Cryptography has distinct paramount significance in interconnected environment where whether we concern about ‘Computer-Security,’ ‘Information-Security,’ ‘Network-Security’ etc., doesn’t matters and, ingredients of this particular branch of computer science viz. ‘Encryption/Decryption’ systems, ‘Hash-Functions,’ ‘Digital-Signatures’ etc. also playing
Sudesh Kumar Mittal, Arvind K. Sharma
openaire   +2 more sources

A Chaos-Based Cryptographic Hash Function for Message Authentication

International Journal of Bifurcation and Chaos in Applied Sciences and Engineering, 2005
In this paper, a chaos-based cryptographic hash function is proposed for message authentication where a fixed length message digest can be generated from any messages with arbitrary length.
H. S. Kwok, W. Tang
semanticscholar   +1 more source

The State of Cryptographic Hash Functions

1999
This paper describes the state of the art for cryptographic hash functions. Different definitions are compared, and the few theoretical results on hash functions are discussed. A brief overview is presented of the most important constructions, and some open problems are presented.
openaire   +2 more sources

Does Fiat-Shamir Require a Cryptographic Hash Function?

IACR Cryptology ePrint Archive, 2020
Yilei Chen   +3 more
semanticscholar   +1 more source

Cryptographic security evaluation of MD4 hash function

Thirteenth National Radio Science Conference. NRSC '96, 2002
Cryptography is the only powerful tool for achieving high levels of information security in a computer networks environment. The ISO have proposed five security service groups including, confidentiality, authentication, data integrity, non-repudiation, and access control.
R.H. Seireg   +2 more
openaire   +2 more sources

Some Observations on the Theory of Cryptographic Hash Functions

Designs, Codes and Cryptography, 2006
In this paper, we study issues related to the notion of "secure" hash functions. Several necessary conditions are considered, as well as a popular sufficient condition (the so-called random oracle model). We study the security of various problems that are motivated by the notion of a secure hash function.
openaire   +1 more source

A Parallel Algorithm for Extending Cryptographic Hash Functions

2001
We describe a parallel algorithm for extending a small domain hash function to a very large domain hash function. Our construction can handle messages of any practical length and preserves the security properties of the basic hash function. The construction can be viewed as a parallel version of the well known Merkle-Damgard construction, which is a ...
Palash Sarkar, Paul J. Schellenberg
openaire   +2 more sources

A quantum hash function with grouped coarse-grained boson sampling

Quantum Information Processing, 2022
Jinjing Shi   +6 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy