Results 21 to 30 of about 34,597 (127)

Finding state-of-the-art non-cryptographic hashes with genetic programming [PDF]

open access: yes, 2006
Proceding of: 9th International Conference, Reykjavik, Iceland, September 9-13, 2006.The design of non-cryptographic hash functions by means of evolutionary computation is a relatively new and unexplored problem.
Estébanez Tascón, César   +3 more
core   +2 more sources

Building Secure and Fast Cryptographic Hash Functions Using Programmable Cellular Automata [PDF]

open access: yes, 2015
Cryptographic hash functions have recently brought an exceptional research interest. With the increasing number of attacks against the widely used functions as MD5, SHA-1 and RIPEMD, the need to consider new hash functions design and conception ...
Alaa Eddine Belfedhal   +1 more
core   +2 more sources

Whirlwind: a new cryptographic hash function [PDF]

open access: yes, 2010
A new cryptographic hash function Whirlwind is presented. We give the full specification and explain the design rationale. We show how the hash function can be implemented efficiently in software and give first performance numbers. A detailed analysis of
Barreto, Paulo   +4 more
core   +3 more sources

ON THE UNIVERSAL TREE MODE OF HASH CODE GENERATION

open access: yesСовременные информационные технологии и IT-образование, 2018
Classical approaches to the construction of hash function modes, based on the using of iterative procedures, do not allow efficient processing of large amounts of data and can’t be adapted to parallel computing architectures.
Dmitriy S. Bogdanov   +2 more
doaj   +1 more source

Keyed Parallel Hash Algorithm Based on Multiple Chaotic Maps (KPHA-MCM)

open access: yesIEEE Access, 2021
Hash functions are considered as the core of cryptography, which are the basic technique used for data security. Cryptographic hash functions also can be used to achieve the integrity of large data such as the data stored in a hard disk and set of ...
Roayat Ismail Abdelfatah   +2 more
doaj   +1 more source

Low-Complexity Cryptographic Hash Functions [PDF]

open access: yes, 2017
Cryptographic hash functions are efficiently computable functions that shrink a long input into a shorter output while achieving some of the useful security properties of a random function.
Applebaum, Benny   +4 more
core   +2 more sources

A Lightweight Hash-Based Blockchain Architecture for Industrial IoT

open access: yesApplied Sciences, 2019
Blockchain is a technology that can ensure data integrity in a distributed network, and it is actively applied in various fields. Recently, blockchain is gaining attention due to combining with the Internet of Things (IoT) technology in the industrial ...
Byoungjin Seok   +2 more
doaj   +1 more source

The Lane hash function [PDF]

open access: yes, 2009
We propose the cryptographic hash function Lane as a candidate for the SHA-3 competition organised by NIST. Lane is an iterated hash function supporting multiple digest sizes. Components of the AES block cipher are reused as building blocks. Lane aims to
  +7 more
core   +1 more source

Regular and almost universal hashing: an efficient implementation [PDF]

open access: yes, 2016
Random hashing can provide guarantees regarding the performance of data structures such as hash tables---even in an adversarial setting. Many existing families of hash functions are universal: given two data objects, the probability that they have the ...
Ignatchenko, Sergey   +2 more
core   +2 more sources

Analysis and implementation of cryptographic hash functions in programmable logic devices / Kriptografinių maišos funkcijų įgyvendinimo programuojamosios logikos lustuose tyrimas

open access: yesMokslas: Lietuvos Ateitis, 2016
In this day’s world, more and more focused on data protection. For data protection using cryptographic science. It is also important for the safe storage of passwords for this uses a cryptographic hash function.
Tautvydas Brukštus
doaj   +1 more source

Home - About - Disclaimer - Privacy