Results 11 to 20 of about 10,638,853 (320)

A Novel Hash Function Based on a Chaotic Sponge and DNA Sequence

open access: yesIEEE Access, 2021
Many chaos-based hash functions have convoluted designs that are not based on proper design principles, complicating the verification of security claims.
Moatsum Alawida   +5 more
doaj   +2 more sources

A New Hash Function Based on Chaotic Maps and Deterministic Finite State Automata

open access: yesIEEE Access, 2020
In this paper, a new chaos-based hash function is proposed based on a recently proposed structure known as the deterministic chaotic finite state automata (DCFSA). Out of its various configurations, we select the forward and parameter permutation variant,
Moatsum Alawida   +5 more
doaj   +2 more sources

Keyed Hash Function Using Hyper Chaotic System With Time-Varying Parameters Perturbation

open access: yesIEEE Access, 2019
Secure hash function plays an important role in cryptography. This paper constructs a hash algorithm using the hyperchaotic Lorenz system, which serves as a sponge function to absorb input message via multiple parameters time-varying perturbation. First,
Hongjun Liu, Abdurahman Kadir, Jian Liu
doaj   +2 more sources

More Efficient Privacy Amplification with Less Random Seeds via Dual Universal Hash Function [PDF]

open access: yesIEEE Transactions on Information Theory, 2015
We explicitly construct random hash functions for privacy amplification (extractors) that require smaller random seed lengths than the previous literature, and still allow efficient implementations with complexity $O(n\log n)$ for input length $n$.
Hayashi, Masahito, Tsurumaru, Toyohiro
core   +2 more sources

Finding Bugs in Cryptographic Hash Function Implementations. [PDF]

open access: yesIEEE Trans Reliab, 2018
Cryptographic hash functions are security-critical algorithms with many practical applications, notably in digital signatures. Developing an approach to test them can be particularly difficult, and bugs can remain unnoticed for many years. We revisit the
Mouha N, Raunak MS, Kuhn DR, Kacker R.
europepmc   +2 more sources

Controlled Alternate Quantum Walks based Quantum Hash Function. [PDF]

open access: yesSci Rep, 2018
Through introducing controlled alternate quantum walks, we present controlled alternate quantum walks (CAQW) based quantum hash function. CAQW based quantum hash function have excellent security, outstanding statistical performance and splendid ...
Li D, Yang YG, Bi JL, Yuan JB, Xu J.
europepmc   +3 more sources

Reinforced Concrete: A Fast Hash Function for Verifiable Computation

open access: yesConference on Computer and Communications Security, 2022
We propose a new hash function Reinforced Concrete, which is the first generic purpose hash that is fast both for a zero-knowledge prover and in native x86 computations.
Lorenzo Grassi   +5 more
semanticscholar   +1 more source

A Novel Improvement With an Effective Expansion to Enhance the MD5 Hash Function for Verification of a Secure E-Document

open access: yesIEEE Access, 2020
MD5 is a one-way cryptographic function used in various fields for maintaining data integrity. The application of a Hash function can provide much protection and privacy and subsequently reduce data usage.
Ammar Mohammed Ali, Alaa Kadhim Farhan
semanticscholar   +1 more source

Optimization of Tree Modes for Parallel Hash Functions: A Case Study [PDF]

open access: yes, 2017
This paper focuses on parallel hash functions based on tree modes of operation for an inner Variable-Input-Length function. This inner function can be either a single-block-length (SBL) and prefix-free MD hash function, or a sponge-based hash function ...
Atighehchi, Kevin, Rolland, Robert
core   +1 more source

Merkle-Damgård Construction Method and Alternatives: A Review

open access: yesJournal of Information and Organizational Sciences, 2017
Cryptographic hash function is an important cryptographic tool in the field of information security. Design of most widely used hash functions such as MD5 and SHA-1 is based on the iterations of compression function by Merkle-Damgård construction method ...
Harshvardhan Tiwari
doaj   +1 more source

Home - About - Disclaimer - Privacy