Results 41 to 50 of about 34,597 (127)

An algebraic hash function based on SL2 [PDF]

open access: yes, 2007
Cryptographic hash functions are fundamental building blocks of many computer security systems and protocols, primarily being used to ensure data integrity.
Regenscheid, Andrew Richard
core   +3 more sources

A Secure and Robust Image Hashing Scheme Using Gaussian Pyramids

open access: yesEntropy, 2019
Image hash is an alternative to cryptographic hash functions for checking integrity of digital images. Compared to cryptographic hash functions, an image hash or a Perceptual Hash Function (PHF) is resilient to content preserving distortions and ...
Iram Bashir   +4 more
doaj   +1 more source

Practical Entropy Accumulation for Random Number Generators with Image Sensor-Based Quantum Noise Sources

open access: yesEntropy, 2023
The efficient generation of high-quality random numbers is essential in the operation of cryptographic modules. The quality of a random number generator is evaluated by the min-entropy of its entropy source.
Youngrak Choi   +2 more
doaj   +1 more source

PPP-Completeness with Connections to Cryptography [PDF]

open access: yes, 2018
Polynomial Pigeonhole Principle (PPP) is an important subclass of TFNP with profound connections to the complexity of the fundamental cryptographic primitives: collision-resistant hash functions and one-way permutations.
Sotiraki, Katerina   +2 more
core   +1 more source

A secure and efficient cryptographic hash function based on NewFORK-256

open access: yesEgyptian Informatics Journal, 2012
Cryptographic hash functions serve as a fundamental building block of information security and are used in numerous security applications and protocols such as digital signature schemes, construction of MAC and random number generation, for ensuring data
Harshvardhan Tiwari, Krishna Asawa
doaj   +1 more source

Computational and Energy Costs of Cryptographic Algorithms on Handheld Devices [PDF]

open access: yes, 2011
Networks are evolving toward a ubiquitous model in which heterogeneous devices are interconnected. Cryptographic algorithms are required for developing security solutions that protect network activity. However, the computational and energy limitations
Herrera JoancomartĂ­, Jordi   +1 more
core   +4 more sources

Integrity verification for digital Holy Quran verses using cryptographic hash function and compression

open access: yesJournal of King Saud University: Computer and Information Sciences, 2020
Data Integrity is one of the primary concepts in information security. The main task of the cryptographic hash function is to assure the integrity of the transmitted data.
Mishal Almazrooie   +5 more
doaj  

Hashing into quadratic residues modulo a safe prime composite [PDF]

open access: yes, 2023
For $n = pq$ a product of two safe primes, we construct and prove security of a cryptographic hash function $H$ mapping into the square residues $QR_n \subset (\mathbb{Z}/n\mathbb{Z})^*$, by squaring the output of an ordinary cryptographic hash function $
Sietse Ringers
core  

A Short Survey on Perceptual Hash Function [PDF]

open access: yes, 2014
The authentication of digital image has become more important as these images can be easily manipulated by using image processing tools leading to various problems such as copyright infringement and hostile tampering to the image contents.
Neelima, Arambam, Singh, Kh Manglem
core  

Collision-resistant hash function based on composition of functions [PDF]

open access: yes, 2011
cryptographic hash function is a deterministic procedure that compresses an arbitrary block of numerical data and returns a fixed-size bit string. There exist many hash functions: MD5, HAVAL, SHA, ...
Ndoundam, Rene, Sadie, Juvet Karnel
core   +4 more sources

Home - About - Disclaimer - Privacy