Results 1 to 10 of about 10,669,972 (391)
The Usefulness of Multilevel Hash Tables with Multiple Hash Functions in Large Databases [PDF]
Anale: Seria Informatică, 2009In this work, attempt is made to select three good hash functions which uniformly distribute hash values that permute their internal states and allow the input bits to generate different output bits.
A.T. Akinwale, F.T. Ibharalu
doaj +4 more sources
A Novel Hash Function Based on a Chaotic Sponge and DNA Sequence
IEEE Access, 2021Many chaos-based hash functions have convoluted designs that are not based on proper design principles, complicating the verification of security claims.
Moatsum Alawida+5 more
doaj +2 more sources
A New Hash Function Based on Chaotic Maps and Deterministic Finite State Automata
IEEE Access, 2020In this paper, a new chaos-based hash function is proposed based on a recently proposed structure known as the deterministic chaotic finite state automata (DCFSA). Out of its various configurations, we select the forward and parameter permutation variant,
Moatsum Alawida+5 more
doaj +2 more sources
An Improved Hash Function Based on the Tillich-Zémor Hash Function [PDF]
Mathematics Interdisciplinary Research, 2018Using the idea behind the Tillich-Zémor hash function, we propose a new hash function. Our hash function is parallelizable and its collision resistance is implied by a hardness assumption on a mathematical problem.
Ahmad Gaeini+2 more
doaj +3 more sources
Finding Bugs in Cryptographic Hash Function Implementations. [PDF]
IEEE Trans Reliab, 2018Cryptographic hash functions are security-critical algorithms with many practical applications, notably in digital signatures. Developing an approach to test them can be particularly difficult, and bugs can remain unnoticed for many years. We revisit the
Mouha N, Raunak MS, Kuhn DR, Kacker R.
europepmc +2 more sources
Quantum hash function based on controlled alternate lively quantum walks [PDF]
Scientific Reports, 2023Quantum hash function is an important area of interest in the field of quantum cryptography. Quantum hash function based on controlled alternate quantum walk is a mainstream branch of quantum hash functions by virtue of high efficiency and flexibility ...
Penglin Hou+4 more
doaj +2 more sources
Implementation and Optimization of Zero-Knowledge Proof Circuit Based on Hash Function SM3 [PDF]
Sensors, 2022With the increasing demand for privacy protection in the blockchain, the universal zero-knowledge proof protocol has been developed and widely used. Because hash function is an important cryptographic primitive in a blockchain, the zero-knowledge proof ...
Yang Yang+7 more
doaj +2 more sources
A Hash of Hash Functions [PDF]
arXiv, 2003In this paper, we present a general review of hash functions in a cryptographic sense. We give special emphasis on some particular topics such as cipher block chaining message authentication code (CBC MAC) and its variants. This paper also broadens the information given in some well known surveys, by including more details on block-cipher based hash ...
arxiv +3 more sources
Keyed Hash Function Using Hyper Chaotic System With Time-Varying Parameters Perturbation
IEEE Access, 2019Secure hash function plays an important role in cryptography. This paper constructs a hash algorithm using the hyperchaotic Lorenz system, which serves as a sponge function to absorb input message via multiple parameters time-varying perturbation. First,
Hongjun Liu, Abdurahman Kadir, Jian Liu
doaj +2 more sources
The Grindahl Hash Functions [PDF]
, 2007In this paper we propose the Grindahl hash functions, which are based on components of the Rijndael algorithm. To make collision search sufficiently difficult, this design has the important feature that no low-weight characteristics form collisions, and at the same time it limits access to the state.
Lars R. Knudsen+2 more
openalex +4 more sources