Results 221 to 230 of about 555,076 (261)
Some of the next articles are maybe not open access.
2020
Don't get intimidated by the title of this chapter. The theory of cryptographic hash functions is not particularly abstruse. What is difficult is the construction of these functions from scratch. However, we need not concern ourselves with this aspect of the mathematical theory since most programming language libraries provide us with a good selection ...
openaire +2 more sources
Don't get intimidated by the title of this chapter. The theory of cryptographic hash functions is not particularly abstruse. What is difficult is the construction of these functions from scratch. However, we need not concern ourselves with this aspect of the mathematical theory since most programming language libraries provide us with a good selection ...
openaire +2 more sources
Towards an automatic design of non-cryptographic hash function
International Conference on Telecommunications and Signal Processing, 2011This paper presents an automatic approach to a non-cryptographic hash function design based on grammar guided genetic programming. The paper describes how it is possible to design a non-cryptographic hash function, implementation issues such as terminal ...
J. Karasek, Radim Burget, Ondrej Morsky
semanticscholar +1 more source
Performance and Security Tradeoffs in Cryptographic Hash Functions
International Journal of Interdisciplinary Telecommunications and Networking, 2020A cryptographic hash function is an important component used in many applications, such as blockchain, authentication, data integrity, and digital signature. With the rapid increase in usage of mobile devices, more attention goes towards the tradeoffs between performance and security of cryptographic hash functions on mobile devices due to their ...
Omar Mohammed Bawazeer+1 more
openaire +2 more sources
A Critical Look at Cryptographic Hash Function Literature
Coding and Cryptology, 2008The cryptographic hash function literature has numerous hash function definitions and hash function requirements, and many of them disagree. This survey talks about the various definitions, and takes steps towards cleaning up the literature by explaining how the field has evolved and accurately depicting the research aims people have today.
Contini, Scott+3 more
openaire +3 more sources
Internationally standardized efficient cryptographic hash function
Proceedings of the International Conference on Security and Cryptography, 2011We claim that the European research and development community can initiate and sustain a process of designing a secure cryptographic hash function that will be widely accepted by the industry due to its superior performances in software compared to any ...
D. Gligoroski+3 more
semanticscholar +1 more source
A Chaos-Based Cryptographic Hash Function for Message Authentication
International Journal of Bifurcation and Chaos in Applied Sciences and Engineering, 2005In this paper, a chaos-based cryptographic hash function is proposed for message authentication where a fixed length message digest can be generated from any messages with arbitrary length.
H. S. Kwok, W. Tang
semanticscholar +1 more source
Cryptographic Keyed Hash Function: PARAŚU-256
Journal of Computational and Theoretical Nanoscience, 2020Cryptography has distinct paramount significance in interconnected environment where whether we concern about ‘Computer-Security,’ ‘Information-Security,’ ‘Network-Security’ etc., doesn’t matters and, ingredients of this particular branch of computer science viz. ‘Encryption/Decryption’ systems, ‘Hash-Functions,’ ‘Digital-Signatures’ etc. also playing
Sudesh Kumar Mittal, Arvind K. Sharma
openaire +2 more sources
The State of Cryptographic Hash Functions
1999This paper describes the state of the art for cryptographic hash functions. Different definitions are compared, and the few theoretical results on hash functions are discussed. A brief overview is presented of the most important constructions, and some open problems are presented.
openaire +2 more sources
Does Fiat-Shamir Require a Cryptographic Hash Function?
IACR Cryptology ePrint Archive, 2020Yilei Chen+3 more
semanticscholar +1 more source
Cryptographic security evaluation of MD4 hash function
Thirteenth National Radio Science Conference. NRSC '96, 2002Cryptography is the only powerful tool for achieving high levels of information security in a computer networks environment. The ISO have proposed five security service groups including, confidentiality, authentication, data integrity, non-repudiation, and access control.
R.H. Seireg+2 more
openaire +2 more sources