Verification of Implementations of Cryptographic Hash Functions
Cryptographic hash functions have become the basis of modern network computing for identity authorization and secure computing; protocol consistency of cryptographic hash functions is one of the most important properties that affect the security and ...
Dexi Wang+5 more
doaj +1 more source
A Monte Carlo study of Cichelli hash-function solvability [PDF]
Raoul Bell, B. N. I. Floyd
openalex +1 more source
The influence of random number generation in dissipative particle dynamics simulations using a cryptographic hash function. [PDF]
Okada K, Brumby PE, Yasuoka K.
europepmc +1 more source
SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions
This Standard specifies the Secure Hash Algorithm-3 (SHA-3) family of functions on binary data. Each of the SHA-3 functions is based on an instance of the K ECCAK algorithm that NIST selected as the winner of the SHA-3 Cryptographic Hash Algorithm ...
M. Dworkin
semanticscholar +1 more source
An undergraduate project to compute minimal perfect hashing functions [PDF]
John A. Trono
openalex +1 more source
Using Hash Functions as a Hedge against Chosen Ciphertext Attack [PDF]
Victor Shoup
openalex +1 more source
A Composition Theorem for Universal One-Way Hash Functions [PDF]
Victor Shoup
openalex +1 more source
Spatiotemporal chaotic one-way Hash function construction based on coupled tent maps
A novel coupled tent maps-based spatiotemporal chaotic cryptographic Hash function was proposed.Compared with the discrete tent map,the coupled discrete tent spatiotemporal chaotic maps have longer computer-realization-period,nearly uniform distribution ...
LIU Jian-dong, FU Xiu-li
doaj +2 more sources
Making Hash Functions from Block Ciphers Secure and Efficient by Using Convolutional Codes [PDF]
Toru Inoue, Kouichi Sakurai
openalex +1 more source
The power of primes: security of authentication based on a universal hash-function family
Message authentication codes (MACs) based on universal hash-function families are becoming increasingly popular due to their fast implementation. In this paper, we investigate a family of universal hash functions that has been appeared repeatedly in the ...
Alomair Basel+2 more
doaj +1 more source