GOST 34.11-2018 Analysis in The Context of Zero-Knowledge Proofs
Zero-knowledge proofs are being increasingly applied to a wide range of tasks in modern distributed information systems. Of particular interest are such areas of activity as digital asset management systems, anonymous electronic voting systems, and ...
Vladlen D. Afonin +2 more
doaj +1 more source
A 2D Cryptographic Hash Function Incorporating Homomorphic Encryption for Secure Digital Signatures [PDF]
Akshay Wali +2 more
openalex +1 more source
secretbase: Cryptographic Hash, Extendable-Output and Binary/Text Encoding Functions [PDF]
Charlie Gao
openalex +1 more source
Key management system for WSNs based on hash functions and elliptic curve cryptography [PDF]
Hamzeh Ghasemzadeh +2 more
openalex +1 more source
Parallelization of Rainbow Tables Generation Using Message Passing Interface: A Study on NTLMv2, MD5, SHA-256 and SHA-512 Cryptographic Hash Functions [PDF]
Mark Vainer +2 more
openalex +1 more source
Amplification of the bit rate for quantum key distribution based on cryptographic hash functions
Juan Pradilla
openalex +1 more source
S-HASH: A Crack Towards Cryptographic Hash Functions
Kaushal Jangid, Vidushi .
openaire +1 more source
Evaluation and design of cryptographic hash functions
Une fonction de hachage est une fonction prenant comme argument un élément de taille arbitraire finie et renvoyant un élément de longueur fixée. Il existe différents types de fonctions de hachage qui correspondent à autant de domaines d'utilisation.
openaire +2 more sources
A Cryptographic Hash Function from Markoff Triples [PDF]
Elena Fuchs +3 more
openalex +1 more source

