Synthetic and real data sets for benchmarking non-cryptographic hash functions [PDF]
The overall assessment of non-cryptographic functions is very complex and there is not a widely used benchmark. These data have been collected and created as a benchmark for testing non-cryptographic hash functions.
Yago Saez +3 more
doaj +2 more sources
A chaotic parallel hash engine with dynamic stochastic diffusion for blockchain and cloud security [PDF]
The design of cryptographic hash functions is crucial for ensuring the security of digital information. In this context, cellular automata (CAs) have emerged as a promising tool due to their inherent parallelism, determinism, and simplicity.
Qianyun Wang +5 more
doaj +2 more sources
The Untapped Potential of Ascon Hash Functions: Benchmarking, Hardware Profiling, and Application Insights for Secure IoT and Blockchain Systems [PDF]
Hash functions are fundamental components in both cryptographic and non-cryptographic systems, supporting secure authentication, data integrity, fingerprinting, and indexing.
Meera Gladis Kurian, Yuhua Chen
doaj +2 more sources
JAVASCRIPT SECURITY USING CRYPTOGRAPHIC HASH FUNCTIONS
The subject of this research is the development of methods of protection against attacks on third-party JavaScript and the document object model (DOM).
Irada Rahimova +3 more
doaj +5 more sources
A hybrid hash framework for post quantum secure zero knowledge identification [PDF]
The advent of quantum computing poses substantial risks to conventional cryptographic mechanisms, particularly hash-based authentication and zero-knowledge identification (ZKI) protocols, which are susceptible to quantum algorithms such as Grover’s and ...
Samarth Bhadane +3 more
doaj +2 more sources
Antibodies and cryptographic hash functions: quantifying the specificity paradox [PDF]
The specificity of the immune response is critical to its biological function, yet the generality of immune recognition implies that antibody binding is multispecific or degenerate.
Robert J. Petrella, Robert J. Petrella
doaj +2 more sources
Enhanced image hash using cellular automata with sponge construction and elliptic curve cryptography for secure image transaction [PDF]
With the rapid development of digital communications, sensitive digital storage security, especially that of images, remains a significant challenge.
M. Mohammed Ibrahim +6 more
doaj +2 more sources
Correction: Antibodies and cryptographic hash functions: quantifying the specificity paradox [PDF]
Robert J. Petrella, Robert J. Petrella
doaj +2 more sources
Lightweight Cryptographic Hash Functions: Design Trends, Comparative Study, and Future Directions
The emergence of the Internet of Things (IoT) has enabled billions of devices that collect large amounts of data to be connected. Therefore, IoT security has fundamental requirements. One critical aspect of IoT security is data integrity.
Susila Windarta +4 more
doaj +1 more source
Cryptographic Hash Functions: [PDF]
Cryptographic hash functions are an important tool of cryptography and play a fundamental role in efficient and secure information processing. A hash function processes an arbitrary finite length input message to a fixed length output referred to as the hash value.
Kan YASUDA, Yu SASAKI
openaire +4 more sources

