Results 11 to 20 of about 10,638,853 (320)
A Novel Hash Function Based on a Chaotic Sponge and DNA Sequence
Many chaos-based hash functions have convoluted designs that are not based on proper design principles, complicating the verification of security claims.
Moatsum Alawida +5 more
doaj +2 more sources
A New Hash Function Based on Chaotic Maps and Deterministic Finite State Automata
In this paper, a new chaos-based hash function is proposed based on a recently proposed structure known as the deterministic chaotic finite state automata (DCFSA). Out of its various configurations, we select the forward and parameter permutation variant,
Moatsum Alawida +5 more
doaj +2 more sources
Keyed Hash Function Using Hyper Chaotic System With Time-Varying Parameters Perturbation
Secure hash function plays an important role in cryptography. This paper constructs a hash algorithm using the hyperchaotic Lorenz system, which serves as a sponge function to absorb input message via multiple parameters time-varying perturbation. First,
Hongjun Liu, Abdurahman Kadir, Jian Liu
doaj +2 more sources
More Efficient Privacy Amplification with Less Random Seeds via Dual Universal Hash Function [PDF]
We explicitly construct random hash functions for privacy amplification (extractors) that require smaller random seed lengths than the previous literature, and still allow efficient implementations with complexity $O(n\log n)$ for input length $n$.
Hayashi, Masahito, Tsurumaru, Toyohiro
core +2 more sources
Finding Bugs in Cryptographic Hash Function Implementations. [PDF]
Cryptographic hash functions are security-critical algorithms with many practical applications, notably in digital signatures. Developing an approach to test them can be particularly difficult, and bugs can remain unnoticed for many years. We revisit the
Mouha N, Raunak MS, Kuhn DR, Kacker R.
europepmc +2 more sources
Controlled Alternate Quantum Walks based Quantum Hash Function. [PDF]
Through introducing controlled alternate quantum walks, we present controlled alternate quantum walks (CAQW) based quantum hash function. CAQW based quantum hash function have excellent security, outstanding statistical performance and splendid ...
Li D, Yang YG, Bi JL, Yuan JB, Xu J.
europepmc +3 more sources
Reinforced Concrete: A Fast Hash Function for Verifiable Computation
We propose a new hash function Reinforced Concrete, which is the first generic purpose hash that is fast both for a zero-knowledge prover and in native x86 computations.
Lorenzo Grassi +5 more
semanticscholar +1 more source
MD5 is a one-way cryptographic function used in various fields for maintaining data integrity. The application of a Hash function can provide much protection and privacy and subsequently reduce data usage.
Ammar Mohammed Ali, Alaa Kadhim Farhan
semanticscholar +1 more source
Optimization of Tree Modes for Parallel Hash Functions: A Case Study [PDF]
This paper focuses on parallel hash functions based on tree modes of operation for an inner Variable-Input-Length function. This inner function can be either a single-block-length (SBL) and prefix-free MD hash function, or a sponge-based hash function ...
Atighehchi, Kevin, Rolland, Robert
core +1 more source
Merkle-Damgård Construction Method and Alternatives: A Review
Cryptographic hash function is an important cryptographic tool in the field of information security. Design of most widely used hash functions such as MD5 and SHA-1 is based on the iterations of compression function by Merkle-Damgård construction method ...
Harshvardhan Tiwari
doaj +1 more source

