Results 1 to 10 of about 10,638,853 (320)

Quantum hash function based on controlled alternate lively quantum walks [PDF]

open access: yesScientific Reports, 2023
Quantum hash function is an important area of interest in the field of quantum cryptography. Quantum hash function based on controlled alternate quantum walk is a mainstream branch of quantum hash functions by virtue of high efficiency and flexibility ...
Penglin Hou   +4 more
doaj   +2 more sources

Implementation and Optimization of Zero-Knowledge Proof Circuit Based on Hash Function SM3 [PDF]

open access: yesSensors, 2022
With the increasing demand for privacy protection in the blockchain, the universal zero-knowledge proof protocol has been developed and widely used. Because hash function is an important cryptographic primitive in a blockchain, the zero-knowledge proof ...
Yang Yang   +7 more
doaj   +2 more sources

XML Data Integrity Based on Concatenated Hash Function [PDF]

open access: green, 2009
Data integrity is the fundamental for data authentication. A major problem for XML data authentication is that signed XML data can be copied to another document but still keep signature valid. This is caused by XML data integrity protecting.
Baolong Liu, Joan Lu, Jim Yip
openalex   +4 more sources

A chaotic parallel hash engine with dynamic stochastic diffusion for blockchain and cloud security [PDF]

open access: yesScientific Reports
The design of cryptographic hash functions is crucial for ensuring the security of digital information. In this context, cellular automata (CAs) have emerged as a promising tool due to their inherent parallelism, determinism, and simplicity.
Qianyun Wang   +5 more
doaj   +2 more sources

SPHINCS+ post-quantum digital signature scheme with Streebog hash function [PDF]

open access: bronze, 2020
Many commonly used public key cryptosystems will become insecure once a scalable quantum computer is built. New cryptographic schemes that can guarantee protection against attacks with quantum computers, so-called post-quantum algorithms, have emerged in
E. O. Kiktenko   +11 more
openalex   +3 more sources

New hash function based on C-MD structure and chaotic neural network

open access: yes网络与信息安全学报, 2023
In recent years, widely used hash algorithms such as MD5 and SHA-1 have been found to have varying degrees of security risks.The iterative structure of the SHA-2 algorithm is similar to that of SHA-1, making it vulnerable to attacks as well.Meanwhile ...
Liquan CHEN, Yuhang ZHU, Yu WANG, Zhongyuan QIN, Yang MA
doaj   +3 more sources

Security Analysis of LNMNT-LightWeight Crypto Hash Function for IoT

open access: yesIEEE Access, 2021
Conventional cryptographic techniques are inappropriate for resource-constrained applications in the Internet of Things (IoT) domain because of their high resources requirement.
Nubila Nabeel   +2 more
doaj   +1 more source

An Improved Hash Function Based on the Tillich-Zémor Hash Function [PDF]

open access: yesMathematics Interdisciplinary Research, 2018
Using the idea behind the Tillich-Zémor hash function, we propose a new hash function. Our hash function is parallelizable and its collision resistance is implied by a hardness assumption on a mathematical problem.
Ahmad Gaeini   +2 more
doaj   +1 more source

Investigating the Avalanche Effect of Various Cryptographically Secure Hash Functions and Hash-Based Applications

open access: yesIEEE Access, 2022
In modern cryptography, hash functions are considered as one of the key components for secure communication. They play a vital role in a wide range of applications such as ensuring the authentication and integrity of the data, in forensic investigation ...
Darshana Upadhyay   +3 more
doaj   +1 more source

A new design paradigm for provably secure keyless hash function with subsets and two variables polynomial function

open access: yesJournal of King Saud University: Computer and Information Sciences, 2022
Provably secure keyless hash function uses Random Oracle (RO) or Sponge principles for the design and construction of security-centric hash algorithms. It capitalizes the aforesaid principles to produce outcomes like MD2, MD5, SHA-160, SHA-224/256, SHA ...
P. Karthik, P. Shanthi Bala
doaj   +1 more source

Home - About - Disclaimer - Privacy