Results 171 to 180 of about 2,959 (212)
ANALYSIS OF IMPLEMENTATIONS OF THE CRYPTOGRAPHIC HASH FUNCTION SHA-1 BASED ON PIPELINE CIRCUITS
E. V. Listopad
openalex +1 more source
Contributions to the theory and application of cryptographic hash functions
Mohammad Reza Reyhanitabar
openalex +1 more source
Don't get intimidated by the title of this chapter. The theory of cryptographic hash functions is not particularly abstruse. What is difficult is the construction of these functions from scratch. However, we need not concern ourselves with this aspect of the mathematical theory since most programming language libraries provide us with a good selection ...
Dorian Činčurak
openaire +2 more sources
Cryptographic Hash Functions For Digital Stamping
The current study's objectives are to analyze a broad overview of hash function applications in cryptography and investigate the connections between digital signature applications and cryptographic hash functions. Applications of the hash function are widespread and used for a variety of purposes, including password hashing, file integrity verification,
Ferdinand Kpieleh
openaire +2 more sources
Cryptographic Hash Functions [PDF]
Kryptografiske hashfunktioner anvendes i mange forskellige områder inden for kryptografi: i digitale signatursystemer og i såkaldt public‐key kryptografi, til passwordbeskyttelse og autentificering af beskeder, til dannelse af kryptografiske nøgler og tilfældige tal, osv.
openaire +2 more sources
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Cryptographic Hash Functions from Expander Graphs
Journal of Cryptology, 2007zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Charles, Denis X. +2 more
openaire +2 more sources
Requirements for cryptographic hash functions
Computers & Security, 1992We give a comprehensive discussion of and structure for the quality requirements good cryptographic hash functions should fulfil. Functional requirements like contraction of the input and fast calculation are ordered by priority in the algorithm design and implementation process.
Fritz Bauspiess, Frank Damm
openaire +1 more source

