Results 111 to 120 of about 36,351 (194)

On graph-based cryptographic hash functions

open access: yes, 2009
Hash functions are an invaluable tool for cryptography. They must primarily satisfy collision resistance, but standardized hash functions like SHA also satisfy stronger properties needed for the wide range of their applications. The design of many hash functions including SHA is based on a compression function that is close to a block cipher and on a ...
openaire   +2 more sources

Black-Box Property of Cryptographic Hash Functions [PDF]

open access: yes, 2012
We define a new black-box property of cryptographic hash function families H :{0,1}K ×{0,1}*→{0,1}y which guarantees that for a randomly chosen hash function H K from the family, everything "non-trivial" we are able to compute having access to the key K , we can compute only with oracle access to H K . If a hash function family is pseudo-random and has
openaire   +1 more source

GOST 34.11-2018 Analysis in The Context of Zero-Knowledge Proofs

open access: yesБезопасность информационных технологий
Zero-knowledge proofs are being increasingly applied to a wide range of tasks in modern distributed information systems. Of particular interest are such areas of activity as digital asset management systems, anonymous electronic voting systems, and ...
Vladlen D. Afonin   +2 more
doaj   +1 more source

S-HASH: A Crack Towards Cryptographic Hash Functions

open access: yesCSVTU Research Journal on Engineering and Technology, 2021
Kaushal Jangid, Vidushi .
openaire   +1 more source

Evaluation and design of cryptographic hash functions

open access: yes, 2010
Une fonction de hachage est une fonction prenant comme argument un élément de taille arbitraire finie et renvoyant un élément de longueur fixée. Il existe différents types de fonctions de hachage qui correspondent à autant de domaines d'utilisation.
openaire   +2 more sources

Analysis of cryptographic hash functions

open access: yes, 2012
The National Institute of Standards and Technology (NIST) launched in 2008 a public competition, called the SHA-3 competition, aiming at definining a new standard for hash functions. We study here the algebraic properties of some of the candidates to this contest. Among the functions analyzed, is the Keccak algorithm, which was recently announced to be
openaire   +1 more source

Securing internet of things devices using a hybrid approach. [PDF]

open access: yesSci Rep
Jenny RS   +9 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy