Results 61 to 70 of about 34,597 (127)

New Way to Construct Cryptographic Hash Function [PDF]

open access: yes, 2014
In this paper, a new way to construct cryptographic hash function is given. The cryptographic hash function is generalized to uncertain function which has various specific function forms.
WANG Yong
core  

Cryptanalysis of a Cayley Hash Function Based on Affine Maps in one Variable over a Finite Field

open access: yes, 2023
Cayley hash functions are cryptographic hashes constructed from Cayley graphs of groups. The hash function proposed by Shpilrain and Sosnovski (2016), based on linear functions over a finite field, was proven insecure.
Sosnovski, Bianca
core  

A Subject-Sensitive Perceptual Hash Based on MUM-Net for the Integrity Authentication of High Resolution Remote Sensing Images

open access: yesISPRS International Journal of Geo-Information, 2020
Data security technology is of great significance to the application of high resolution remote sensing image (HRRS) images. As an important data security technology, perceptual hash overcomes the shortcomings of cryptographic hashing that is not robust ...
Kaimeng Ding   +3 more
doaj   +1 more source

Design keyed Hash function based on couple chaotic system

open access: yesTongxin xuebao, 2006
Analyzed the chaotic and cryptographic properties of a piecewise nonlinear map, a couple chaotic digital sys-tem was proposed based on perturbing which used the piecewise nonlinear, then a new approach to construct keyed Hash function was presented.
WEI Peng-cheng1   +3 more
doaj   +2 more sources

STUDYING QUANTUM HASHING CRYPTOGRAPHIC STRENGTH [PDF]

open access: yes, 2018
.This research solves the problem of studying quantum hashing cryptographic strength. The mostimportant criteria, that should be taken into consideration during cryptographic strength studying, is quantum hashing strength against collisions, and ...
Burnashev, Rustam   +3 more
core   +1 more source

A Cryptographic Escrow for Treaty Declarations and Step-by-Step Verification

open access: yes, 2018
The verification of arms-control and disarmament agreements requires states to provide declarations, including information on sensitive military sites and assets.
Felten, Edward W.   +2 more
core   +1 more source

Efficient Side-Channel Secure Message Authentication with Better Bounds

open access: yesIACR Transactions on Symmetric Cryptology, 2020
We investigate constructing message authentication schemes from symmetric cryptographic primitives, with the goal of achieving security when most intermediate values during tag computation and verification are leaked (i.e., mode-level leakage-resilience).
Chun Guo   +3 more
doaj   +1 more source

A trapdoor one-way function for verifiable secret sharing

open access: yesHigh-Confidence Computing, 2022
This paper proposes a (t,n)–threshold verifiable secret sharing scheme with changeable parameters based on a trapdoor one-way function. This scheme consists of a generation phase, a distribution phase, an encoding phase and a reconstruction phase.
Ali Kanso, Mohammad Ghebleh
doaj  

A perceptual hash function to store and retrieve large scale DNA sequences

open access: yes, 2014
This paper proposes a novel approach for storing and retrieving massive DNA sequences.. The method is based on a perceptual hash function, commonly used to determine the similarity between digital images, that we adapted for DNA sequences.
Bailly, Xavier   +3 more
core  

Home - About - Disclaimer - Privacy