Results 11 to 20 of about 159,796 (327)

A Novel Hash Function Based on a Chaotic Sponge and DNA Sequence

open access: yesIEEE Access, 2021
Many chaos-based hash functions have convoluted designs that are not based on proper design principles, complicating the verification of security claims.
Moatsum Alawida   +5 more
doaj   +1 more source

Optimization of Tree Modes for Parallel Hash Functions: A Case Study [PDF]

open access: yes, 2017
This paper focuses on parallel hash functions based on tree modes of operation for an inner Variable-Input-Length function. This inner function can be either a single-block-length (SBL) and prefix-free MD hash function, or a sponge-based hash function ...
Atighehchi, Kevin, Rolland, Robert
core   +1 more source

A New Hash Function Based on Chaotic Maps and Deterministic Finite State Automata

open access: yesIEEE Access, 2020
In this paper, a new chaos-based hash function is proposed based on a recently proposed structure known as the deterministic chaotic finite state automata (DCFSA). Out of its various configurations, we select the forward and parameter permutation variant,
Moatsum Alawida   +5 more
doaj   +1 more source

Merkle-Damgård Construction Method and Alternatives: A Review

open access: yesJournal of Information and Organizational Sciences, 2017
Cryptographic hash function is an important cryptographic tool in the field of information security. Design of most widely used hash functions such as MD5 and SHA-1 is based on the iterations of compression function by Merkle-Damgård construction method ...
Harshvardhan Tiwari
doaj   +1 more source

Supervised Matrix Factorization Hashing With Quantitative Loss for Image-Text Search

open access: yesIEEE Access, 2020
Image-text hashing approaches have been widely applied in large-scale similarity search applications due to their efficiency in both search speed and storage efficiency.
Huan Zhao   +3 more
doaj   +1 more source

Multimixer-128: Universal Keyed Hashing Based on Integer Multiplication

open access: yesIACR Transactions on Symmetric Cryptology, 2023
In this paper we introduce a new keyed hash function based on 32-bit integer multiplication that we call Multimixer-128. In our approach, we follow the key-then-hash parallel paradigm. So, we first add a variable length input message to a secret key and
Koustabh Ghosh   +2 more
doaj   +1 more source

Parameterized Hash Functions

open access: yesAnnales UMCS, Informatica, 2012
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Bilski, Tomasz   +3 more
openaire   +2 more sources

A new hash function and its use in read mapping on genome [PDF]

open access: yesAUT Journal of Mathematics and Computing, 2020
Mapping reads onto genomes is an indispensable step in sequencing data analysis. A widely used method to speed up mapping is to index a genome by a hash table, in which genomic positions of $k$-mers are stored in the table.
Farzaneh Salari   +2 more
doaj   +1 more source

From Graphs to Keyed Quantum Hash Functions [PDF]

open access: yes, 2016
We present two new constructions of quantum hash functions: the first based on expander graphs and the second based on extractor functions and estimate the amount of randomness that is needed to construct them.
Ziatdinov, Mansur
core   +2 more sources

Analysis of the amplitude form of the quantum hash function

open access: yesУчёные записки Казанского университета: Серия Физико-математические науки, 2023
In this article, the properties of quantum hash functions are further explored. Previous findings show that so-called small-bias sets (special subsets of the set of elements of a cyclic group) generate a “phase” quantum hash function. Here, it was proved
M. F. Ablayev   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy