Results 31 to 40 of about 38,362 (243)

The Lane hash function [PDF]

open access: yes, 2009
We propose the cryptographic hash function Lane as a candidate for the SHA-3 competition organised by NIST. Lane is an iterated hash function supporting multiple digest sizes. Components of the AES block cipher are reused as building blocks. Lane aims to
  +7 more
core   +1 more source

SPHINCS$^+$ post-quantum digital signature scheme with Streebog hash function

open access: yes, 2020
Many commonly used public key cryptosystems will become insecure once a scalable quantum computer is built. New cryptographic schemes that can guarantee protection against attacks with quantum computers, so-called post-quantum algorithms, have emerged in
Anufriev, M. N.   +5 more
core   +1 more source

Computational and Energy Costs of Cryptographic Algorithms on Handheld Devices [PDF]

open access: yes, 2011
Networks are evolving toward a ubiquitous model in which heterogeneous devices are interconnected. Cryptographic algorithms are required for developing security solutions that protect network activity. However, the computational and energy limitations
Herrera Joancomartí, Jordi   +1 more
core   +4 more sources

Construction and Analysis of SHA-256 Compression Function Based on Chaos S-Box

open access: yesIEEE Access, 2021
To further improve the security of SHA-256, a compression function construction scheme based on chaotic S-box is proposed. Through the reasonable design of the iteration mode and using the nonlinearity, confusion, and anti-difference of chaotic S-box ...
Juan Wang, Ge Liu, Yongqi Chen, Shu Wang
doaj   +1 more source

Security of a New Cryptographic Hash Function - Titanium [PDF]

open access: yesIndonesian Journal of Electrical Engineering and Computer Science, 2018
This paper introduces the security analysis of Titanium hash function that uses SF block cipher and follows sponge construction. A brief description of the sponge function and the design choice of Titanium are introduced. Basic security criteria of random function have been presented and studied on Titanium and then, differential cryptanalysis on ...
Abdullah Nazeeh Saleh   +1 more
openaire   +3 more sources

Example of internal function for Sponge scheme built on the basis of the generalized AES design methodology

open access: yesDoklady Belorusskogo gosudarstvennogo universiteta informatiki i radioèlektroniki, 2021
The purpose of this article is to construct an internal function underlying the “Sponge” scheme for constructing  cryptographic  hash  functions.  An  internal  function in  the  “Sponge”  scheme  is  a  fixed-length transformation  or  permutation  that 
R. M. Ospanov   +3 more
doaj   +1 more source

Remote booting in a hostile world: to whom am I speaking? [Computer security] [PDF]

open access: yes, 1995
“This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders.
Christianson, B., Lomas, M.
core   +1 more source

A new design paradigm for provably secure keyless hash function with subsets and two variables polynomial function

open access: yesJournal of King Saud University: Computer and Information Sciences, 2022
Provably secure keyless hash function uses Random Oracle (RO) or Sponge principles for the design and construction of security-centric hash algorithms. It capitalizes the aforesaid principles to produce outcomes like MD2, MD5, SHA-160, SHA-224/256, SHA ...
P. Karthik, P. Shanthi Bala
doaj   +1 more source

Practical Preimages for Maraca [PDF]

open access: yes, 2009
We show a practical preimage attack on the cryptographic hash function Maraca, which was submitted as a candidate to the NIST SHA-3 competition.
Indesteege, Sebastiaan, Preneel, Bart
core   +1 more source

Digital Signature for data and documents using operating PKI certificates [PDF]

open access: yesSHS Web of Conferences, 2021
This report represents my researching work for a six-month internship in Lex Persona Enterprise. "The implementation of applications that sign data and files electronically using operating digital certificates" is the central theme of this research. This
El Mane Adil   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy