Results 1 to 10 of about 10,669,972 (391)

The Usefulness of Multilevel Hash Tables with Multiple Hash Functions in Large Databases [PDF]

open access: yesAnale: Seria Informatică, 2009
In this work, attempt is made to select three good hash functions which uniformly distribute hash values that permute their internal states and allow the input bits to generate different output bits.
A.T. Akinwale, F.T. Ibharalu
doaj   +4 more sources

A Novel Hash Function Based on a Chaotic Sponge and DNA Sequence

open access: yesIEEE Access, 2021
Many chaos-based hash functions have convoluted designs that are not based on proper design principles, complicating the verification of security claims.
Moatsum Alawida   +5 more
doaj   +2 more sources

A New Hash Function Based on Chaotic Maps and Deterministic Finite State Automata

open access: yesIEEE Access, 2020
In this paper, a new chaos-based hash function is proposed based on a recently proposed structure known as the deterministic chaotic finite state automata (DCFSA). Out of its various configurations, we select the forward and parameter permutation variant,
Moatsum Alawida   +5 more
doaj   +2 more sources

An Improved Hash Function Based on the Tillich-Zémor Hash Function [PDF]

open access: yesMathematics Interdisciplinary Research, 2018
Using the idea behind the Tillich-Zémor hash function, we propose a new hash function. Our hash function is parallelizable and its collision resistance is implied by a hardness assumption on a mathematical problem.
Ahmad Gaeini   +2 more
doaj   +3 more sources

Finding Bugs in Cryptographic Hash Function Implementations. [PDF]

open access: yesIEEE Trans Reliab, 2018
Cryptographic hash functions are security-critical algorithms with many practical applications, notably in digital signatures. Developing an approach to test them can be particularly difficult, and bugs can remain unnoticed for many years. We revisit the
Mouha N, Raunak MS, Kuhn DR, Kacker R.
europepmc   +2 more sources

Quantum hash function based on controlled alternate lively quantum walks [PDF]

open access: yesScientific Reports, 2023
Quantum hash function is an important area of interest in the field of quantum cryptography. Quantum hash function based on controlled alternate quantum walk is a mainstream branch of quantum hash functions by virtue of high efficiency and flexibility ...
Penglin Hou   +4 more
doaj   +2 more sources

Implementation and Optimization of Zero-Knowledge Proof Circuit Based on Hash Function SM3 [PDF]

open access: yesSensors, 2022
With the increasing demand for privacy protection in the blockchain, the universal zero-knowledge proof protocol has been developed and widely used. Because hash function is an important cryptographic primitive in a blockchain, the zero-knowledge proof ...
Yang Yang   +7 more
doaj   +2 more sources

A Hash of Hash Functions [PDF]

open access: yesarXiv, 2003
In this paper, we present a general review of hash functions in a cryptographic sense. We give special emphasis on some particular topics such as cipher block chaining message authentication code (CBC MAC) and its variants. This paper also broadens the information given in some well known surveys, by including more details on block-cipher based hash ...
arxiv   +3 more sources

Keyed Hash Function Using Hyper Chaotic System With Time-Varying Parameters Perturbation

open access: yesIEEE Access, 2019
Secure hash function plays an important role in cryptography. This paper constructs a hash algorithm using the hyperchaotic Lorenz system, which serves as a sponge function to absorb input message via multiple parameters time-varying perturbation. First,
Hongjun Liu, Abdurahman Kadir, Jian Liu
doaj   +2 more sources

The Grindahl Hash Functions [PDF]

open access: bronze, 2007
In this paper we propose the Grindahl hash functions, which are based on components of the Rijndael algorithm. To make collision search sufficiently difficult, this design has the important feature that no low-weight characteristics form collisions, and at the same time it limits access to the state.
Lars R. Knudsen   +2 more
openalex   +4 more sources

Home - About - Disclaimer - Privacy