Results 221 to 230 of about 75,969 (261)
Some of the next articles are maybe not open access.
A Critical Look at Cryptographic Hash Function Literature
Coding and Cryptology, 2008The cryptographic hash function literature has numerous hash function definitions and hash function requirements, and many of them disagree. This survey talks about the various definitions, and takes steps towards cleaning up the literature by explaining how the field has evolved and accurately depicting the research aims people have today.
Contini, Scott+3 more
openaire +3 more sources
Performance and Security Tradeoffs in Cryptographic Hash Functions
International Journal of Interdisciplinary Telecommunications and Networking, 2020A cryptographic hash function is an important component used in many applications, such as blockchain, authentication, data integrity, and digital signature. With the rapid increase in usage of mobile devices, more attention goes towards the tradeoffs between performance and security of cryptographic hash functions on mobile devices due to their ...
Omar Mohammed Bawazeer+1 more
openaire +2 more sources
Cryptographic Keyed Hash Function: PARAŚU-256
Journal of Computational and Theoretical Nanoscience, 2020Cryptography has distinct paramount significance in interconnected environment where whether we concern about ‘Computer-Security,’ ‘Information-Security,’ ‘Network-Security’ etc., doesn’t matters and, ingredients of this particular branch of computer science viz. ‘Encryption/Decryption’ systems, ‘Hash-Functions,’ ‘Digital-Signatures’ etc. also playing
Sudesh Kumar Mittal, Arvind K. Sharma
openaire +2 more sources
A Chaos-Based Cryptographic Hash Function for Message Authentication
International Journal of Bifurcation and Chaos in Applied Sciences and Engineering, 2005In this paper, a chaos-based cryptographic hash function is proposed for message authentication where a fixed length message digest can be generated from any messages with arbitrary length.
H. S. Kwok, W. Tang
semanticscholar +1 more source
The State of Cryptographic Hash Functions
1999This paper describes the state of the art for cryptographic hash functions. Different definitions are compared, and the few theoretical results on hash functions are discussed. A brief overview is presented of the most important constructions, and some open problems are presented.
openaire +2 more sources
Does Fiat-Shamir Require a Cryptographic Hash Function?
IACR Cryptology ePrint Archive, 2020Yilei Chen+3 more
semanticscholar +1 more source
Cryptographic security evaluation of MD4 hash function
Thirteenth National Radio Science Conference. NRSC '96, 2002Cryptography is the only powerful tool for achieving high levels of information security in a computer networks environment. The ISO have proposed five security service groups including, confidentiality, authentication, data integrity, non-repudiation, and access control.
R.H. Seireg+2 more
openaire +2 more sources
Some Observations on the Theory of Cryptographic Hash Functions
Designs, Codes and Cryptography, 2006In this paper, we study issues related to the notion of "secure" hash functions. Several necessary conditions are considered, as well as a popular sufficient condition (the so-called random oracle model). We study the security of various problems that are motivated by the notion of a secure hash function.
openaire +1 more source
A Parallel Algorithm for Extending Cryptographic Hash Functions
2001We describe a parallel algorithm for extending a small domain hash function to a very large domain hash function. Our construction can handle messages of any practical length and preserves the security properties of the basic hash function. The construction can be viewed as a parallel version of the well known Merkle-Damgard construction, which is a ...
Palash Sarkar, Paul J. Schellenberg
openaire +2 more sources
A quantum hash function with grouped coarse-grained boson sampling
Quantum Information Processing, 2022Jinjing Shi+6 more
semanticscholar +1 more source