Results 91 to 100 of about 10,388,112 (269)

Verification of Implementations of Cryptographic Hash Functions

open access: yesIEEE Access, 2017
Cryptographic hash functions have become the basis of modern network computing for identity authorization and secure computing; protocol consistency of cryptographic hash functions is one of the most important properties that affect the security and ...
Dexi Wang   +5 more
doaj   +1 more source

SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions

open access: yes, 2015
This Standard specifies the Secure Hash Algorithm-3 (SHA-3) family of functions on binary data. Each of the SHA-3 functions is based on an instance of the K ECCAK algorithm that NIST selected as the winner of the SHA-3 Cryptographic Hash Algorithm ...
M. Dworkin
semanticscholar   +1 more source

Spatiotemporal chaotic one-way Hash function construction based on coupled tent maps

open access: yesTongxin xuebao, 2007
A novel coupled tent maps-based spatiotemporal chaotic cryptographic Hash function was proposed.Compared with the discrete tent map,the coupled discrete tent spatiotemporal chaotic maps have longer computer-realization-period,nearly uniform distribution ...
LIU Jian-dong, FU Xiu-li
doaj   +2 more sources

The power of primes: security of authentication based on a universal hash-function family

open access: yesJournal of Mathematical Cryptology, 2010
Message authentication codes (MACs) based on universal hash-function families are becoming increasingly popular due to their fast implementation. In this paper, we investigate a family of universal hash functions that has been appeared repeatedly in the ...
Alomair Basel   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy