Results 11 to 20 of about 154,141 (333)

Investigating the Avalanche Effect of Various Cryptographically Secure Hash Functions and Hash-Based Applications

open access: yesIEEE Access, 2022
In modern cryptography, hash functions are considered as one of the key components for secure communication. They play a vital role in a wide range of applications such as ensuring the authentication and integrity of the data, in forensic investigation ...
Darshana Upadhyay   +3 more
doaj   +1 more source

A Novel Hash Function Based on a Chaotic Sponge and DNA Sequence

open access: yesIEEE Access, 2021
Many chaos-based hash functions have convoluted designs that are not based on proper design principles, complicating the verification of security claims.
Moatsum Alawida   +5 more
doaj   +1 more source

A new design paradigm for provably secure keyless hash function with subsets and two variables polynomial function

open access: yesJournal of King Saud University: Computer and Information Sciences, 2022
Provably secure keyless hash function uses Random Oracle (RO) or Sponge principles for the design and construction of security-centric hash algorithms. It capitalizes the aforesaid principles to produce outcomes like MD2, MD5, SHA-160, SHA-224/256, SHA ...
P. Karthik, P. Shanthi Bala
doaj   +1 more source

Optimization of Tree Modes for Parallel Hash Functions: A Case Study [PDF]

open access: yes, 2017
This paper focuses on parallel hash functions based on tree modes of operation for an inner Variable-Input-Length function. This inner function can be either a single-block-length (SBL) and prefix-free MD hash function, or a sponge-based hash function ...
Atighehchi, Kevin, Rolland, Robert
core   +1 more source

Cryptographic Hash Functions [PDF]

open access: yes, 2010
Cryptographic hash functions are an important tool of cryptography and play a fundamental role in efficient and secure information processing. A hash function processes an arbitrary finite length input message to a fixed length output referred to as the hash value.
Gauravaram, Praveen, Knudsen, Lars R.
openaire   +3 more sources

A New Hash Function Based on Chaotic Maps and Deterministic Finite State Automata

open access: yesIEEE Access, 2020
In this paper, a new chaos-based hash function is proposed based on a recently proposed structure known as the deterministic chaotic finite state automata (DCFSA). Out of its various configurations, we select the forward and parameter permutation variant,
Moatsum Alawida   +5 more
doaj   +1 more source

Merkle-Damgård Construction Method and Alternatives: A Review

open access: yesJournal of Information and Organizational Sciences, 2017
Cryptographic hash function is an important cryptographic tool in the field of information security. Design of most widely used hash functions such as MD5 and SHA-1 is based on the iterations of compression function by Merkle-Damgård construction method ...
Harshvardhan Tiwari
doaj   +1 more source

Supervised Matrix Factorization Hashing With Quantitative Loss for Image-Text Search

open access: yesIEEE Access, 2020
Image-text hashing approaches have been widely applied in large-scale similarity search applications due to their efficiency in both search speed and storage efficiency.
Huan Zhao   +3 more
doaj   +1 more source

Multimixer-128: Universal Keyed Hashing Based on Integer Multiplication

open access: yesIACR Transactions on Symmetric Cryptology, 2023
In this paper we introduce a new keyed hash function based on 32-bit integer multiplication that we call Multimixer-128. In our approach, we follow the key-then-hash parallel paradigm. So, we first add a variable length input message to a secret key and
Koustabh Ghosh   +2 more
doaj   +1 more source

A new hash function and its use in read mapping on genome [PDF]

open access: yesAUT Journal of Mathematics and Computing, 2020
Mapping reads onto genomes is an indispensable step in sequencing data analysis. A widely used method to speed up mapping is to index a genome by a hash table, in which genomic positions of $k$-mers are stored in the table.
Farzaneh Salari   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy