Results 111 to 120 of about 2,959 (212)
An Enhanced Non-Cryptographic Hash Function
Steve Okyere-Gyamfi +2 more
openaire +1 more source
Non-Cryptographic Hash Functions: Focus on FNV
In this thesis, we will explore the world of hash functions. After a brief overview of the construction and uses of cryptographic hashes, we will then focus almost exclusively on non-cryptographic functions. We delve into the FNV family of hash functions in significant detail, examining their background, structure and motivation. We then introduce some
openaire +1 more source
Blockchain-driven smart contract with key exchange protocol for secure device-to-device communication using verkle tree K-ary structures. [PDF]
Simbu A, Nandakumar S, Saravanan K.
europepmc +1 more source
Edon-$\Cal R (256,384,512)$ -- an efficient implementation of Edon-$\Cal R$ family of cryptographic hash functions [PDF]
Danilo Gligoroski, Svein J. Knapskog
openalex
Design of a New Cryptographic Hash Function – Titanium
Mohammad A. AlAhmad
openalex +2 more sources
A Lightweight Authentication and Key Distribution Protocol for XR Glasses Using PUF and Cloud-Assisted ECC. [PDF]
Cha W, Lee HJ, Kook S, Kim K, Won D.
europepmc +1 more source
Role of Hash Function in Cryptography
Edem Swathi, G. Vivek, G. Sandhya Rani
openalex +1 more source
Cryptographic hash function SafeBK
openaire +1 more source
Cryptanalysis of Dedicated Cryptographic Hash Functions
In this thesis we study the security of a number of dedicated cryptographic hash functions against cryptanalytic attacks. We begin with an introduction to what cryptographic hash functions are and what they are used for. This is followed by strict definitions of the security properties often required from cryptographic hash functions.
openaire +1 more source

