Results 111 to 120 of about 36,351 (194)
On graph-based cryptographic hash functions
Hash functions are an invaluable tool for cryptography. They must primarily satisfy collision resistance, but standardized hash functions like SHA also satisfy stronger properties needed for the wide range of their applications. The design of many hash functions including SHA is based on a compression function that is close to a block cipher and on a ...
openaire +2 more sources
Black-Box Property of Cryptographic Hash Functions [PDF]
We define a new black-box property of cryptographic hash function families H :{0,1}K ×{0,1}*→{0,1}y which guarantees that for a randomly chosen hash function H K from the family, everything "non-trivial" we are able to compute having access to the key K , we can compute only with oracle access to H K . If a hash function family is pseudo-random and has
openaire +1 more source
GOST 34.11-2018 Analysis in The Context of Zero-Knowledge Proofs
Zero-knowledge proofs are being increasingly applied to a wide range of tasks in modern distributed information systems. Of particular interest are such areas of activity as digital asset management systems, anonymous electronic voting systems, and ...
Vladlen D. Afonin +2 more
doaj +1 more source
S-HASH: A Crack Towards Cryptographic Hash Functions
Kaushal Jangid, Vidushi .
openaire +1 more source
Evaluation and design of cryptographic hash functions
Une fonction de hachage est une fonction prenant comme argument un élément de taille arbitraire finie et renvoyant un élément de longueur fixée. Il existe différents types de fonctions de hachage qui correspondent à autant de domaines d'utilisation.
openaire +2 more sources
Analysis of cryptographic hash functions
The National Institute of Standards and Technology (NIST) launched in 2008 a public competition, called the SHA-3 competition, aiming at definining a new standard for hash functions. We study here the algebraic properties of some of the candidates to this contest. Among the functions analyzed, is the Keccak algorithm, which was recently announced to be
openaire +1 more source
Securing internet of things devices using a hybrid approach. [PDF]
Jenny RS +9 more
europepmc +1 more source
BAAR: A framework for blockchain-based anonymous and revocable user authentication scheme. [PDF]
Ahmed M, Ahmad A, Zeshan F, Akram S.
europepmc +1 more source
QRBT: Quantum Driven Reinforcement Learning for Scalable Blockchain Transaction Processing. [PDF]
Lella KK, Mallu SRK.
europepmc +1 more source

