Synthetic and real data sets for benchmarking non-cryptographic hash functions [PDF]
The overall assessment of non-cryptographic functions is very complex and there is not a widely used benchmark. These data have been collected and created as a benchmark for testing non-cryptographic hash functions.
Yago Saez +3 more
doaj +2 more sources
Cryptographic Hash Functions [PDF]
Kryptografiske hashfunktioner anvendes i mange forskellige områder inden for kryptografi: i digitale signatursystemer og i såkaldt public‐key kryptografi, til passwordbeskyttelse og autentificering af beskeder, til dannelse af kryptografiske nøgler og tilfældige tal, osv.
Thomsen, Søren Steffen
core +3 more sources
A chaotic parallel hash engine with dynamic stochastic diffusion for blockchain and cloud security [PDF]
The design of cryptographic hash functions is crucial for ensuring the security of digital information. In this context, cellular automata (CAs) have emerged as a promising tool due to their inherent parallelism, determinism, and simplicity.
Qianyun Wang +5 more
doaj +2 more sources
JAVASCRIPT SECURITY USING CRYPTOGRAPHIC HASH FUNCTIONS
The subject of this research is the development of methods of protection against attacks on third-party JavaScript and the document object model (DOM).
Irada Rahimova +3 more
doaj +5 more sources
The Untapped Potential of Ascon Hash Functions: Benchmarking, Hardware Profiling, and Application Insights for Secure IoT and Blockchain Systems [PDF]
Hash functions are fundamental components in both cryptographic and non-cryptographic systems, supporting secure authentication, data integrity, fingerprinting, and indexing.
Meera Gladis Kurian, Yuhua Chen
doaj +2 more sources
A hybrid hash framework for post quantum secure zero knowledge identification [PDF]
The advent of quantum computing poses substantial risks to conventional cryptographic mechanisms, particularly hash-based authentication and zero-knowledge identification (ZKI) protocols, which are susceptible to quantum algorithms such as Grover’s and ...
Samarth Bhadane +3 more
doaj +2 more sources
Antibodies and cryptographic hash functions: quantifying the specificity paradox [PDF]
The specificity of the immune response is critical to its biological function, yet the generality of immune recognition implies that antibody binding is multispecific or degenerate.
Robert J. Petrella, Robert J. Petrella
doaj +2 more sources
Computational and Energy Costs of Cryptographic Algorithms on Handheld Devices [PDF]
Networks are evolving toward a ubiquitous model in which heterogeneous devices are interconnected. Cryptographic algorithms are required for developing security solutions that protect network activity. However, the computational and energy limitations of
Helena Rifà-Pous +1 more
doaj +6 more sources
Enhanced image hash using cellular automata with sponge construction and elliptic curve cryptography for secure image transaction [PDF]
With the rapid development of digital communications, sensitive digital storage security, especially that of images, remains a significant challenge.
M. Mohammed Ibrahim +6 more
doaj +2 more sources
Correction: Antibodies and cryptographic hash functions: quantifying the specificity paradox [PDF]
Robert J. Petrella, Robert J. Petrella
doaj +2 more sources

