A Novel Hash Function Based on a Chaotic Sponge and DNA Sequence
Many chaos-based hash functions have convoluted designs that are not based on proper design principles, complicating the verification of security claims.
Moatsum Alawida+5 more
doaj +2 more sources
A New Hash Function Based on Chaotic Maps and Deterministic Finite State Automata
In this paper, a new chaos-based hash function is proposed based on a recently proposed structure known as the deterministic chaotic finite state automata (DCFSA). Out of its various configurations, we select the forward and parameter permutation variant,
Moatsum Alawida+5 more
doaj +2 more sources
Finding Bugs in Cryptographic Hash Function Implementations. [PDF]
Cryptographic hash functions are security-critical algorithms with many practical applications, notably in digital signatures. Developing an approach to test them can be particularly difficult, and bugs can remain unnoticed for many years. We revisit the
Mouha N, Raunak MS, Kuhn DR, Kacker R.
europepmc +2 more sources
An Improved Hash Function Based on the Tillich-Zémor Hash Function [PDF]
Using the idea behind the Tillich-Zémor hash function, we propose a new hash function. Our hash function is parallelizable and its collision resistance is implied by a hardness assumption on a mathematical problem.
Ahmad Gaeini+2 more
doaj +3 more sources
Quantum hash function based on controlled alternate lively quantum walks [PDF]
Quantum hash function is an important area of interest in the field of quantum cryptography. Quantum hash function based on controlled alternate quantum walk is a mainstream branch of quantum hash functions by virtue of high efficiency and flexibility ...
Penglin Hou+4 more
doaj +2 more sources
Controlled Alternate Quantum Walks based Quantum Hash Function. [PDF]
Through introducing controlled alternate quantum walks, we present controlled alternate quantum walks (CAQW) based quantum hash function. CAQW based quantum hash function have excellent security, outstanding statistical performance and splendid ...
Li D, Yang YG, Bi JL, Yuan JB, Xu J.
europepmc +3 more sources
Implementation and Optimization of Zero-Knowledge Proof Circuit Based on Hash Function SM3 [PDF]
With the increasing demand for privacy protection in the blockchain, the universal zero-knowledge proof protocol has been developed and widely used. Because hash function is an important cryptographic primitive in a blockchain, the zero-knowledge proof ...
Yang Yang+7 more
doaj +2 more sources
The Grindahl Hash Functions [PDF]
In this paper we propose the Grindahl hash functions, which are based on components of the Rijndael algorithm. To make collision search sufficiently difficult, this design has the important feature that no low-weight characteristics form collisions, and at the same time it limits access to the state.
Lars R. Knudsen+2 more
openalex +4 more sources
Keyed Hash Function Using Hyper Chaotic System With Time-Varying Parameters Perturbation
Secure hash function plays an important role in cryptography. This paper constructs a hash algorithm using the hyperchaotic Lorenz system, which serves as a sponge function to absorb input message via multiple parameters time-varying perturbation. First,
Hongjun Liu, Abdurahman Kadir, Jian Liu
doaj +2 more sources
Quantum Hash function and its application to privacy amplification in quantum key distribution, pseudo-random number generation and image encryption. [PDF]
Quantum information and quantum computation have achieved a huge success during the last years. In this paper, we investigate the capability of quantum Hash function, which can be constructed by subtly modifying quantum walks, a famous quantum ...
Yang YG, Xu P, Yang R, Zhou YH, Shi WM.
europepmc +2 more sources