Results 11 to 20 of about 157,357 (284)
A Novel Hash Function Based on a Chaotic Sponge and DNA Sequence
Many chaos-based hash functions have convoluted designs that are not based on proper design principles, complicating the verification of security claims.
Moatsum Alawida +5 more
doaj +1 more source
The Grindahl Hash Functions [PDF]
In this paper we propose the Grindahl hash functions, which are based on components of the Rijndael algorithm. To make collision search sufficiently difficult, this design has the important feature that no low-weight characteristics form collisions, and at the same time it limits access to the state.
Lars R. Knudsen +2 more
openaire +1 more source
Optimization of Tree Modes for Parallel Hash Functions: A Case Study [PDF]
This paper focuses on parallel hash functions based on tree modes of operation for an inner Variable-Input-Length function. This inner function can be either a single-block-length (SBL) and prefix-free MD hash function, or a sponge-based hash function ...
Atighehchi, Kevin, Rolland, Robert
core +1 more source
Merkle-Damgård Construction Method and Alternatives: A Review
Cryptographic hash function is an important cryptographic tool in the field of information security. Design of most widely used hash functions such as MD5 and SHA-1 is based on the iterations of compression function by Merkle-Damgård construction method ...
Harshvardhan Tiwari
doaj +1 more source
Supervised Matrix Factorization Hashing With Quantitative Loss for Image-Text Search
Image-text hashing approaches have been widely applied in large-scale similarity search applications due to their efficiency in both search speed and storage efficiency.
Huan Zhao +3 more
doaj +1 more source
Multimixer-128: Universal Keyed Hashing Based on Integer Multiplication
In this paper we introduce a new keyed hash function based on 32-bit integer multiplication that we call Multimixer-128. In our approach, we follow the key-then-hash parallel paradigm. So, we first add a variable length input message to a secret key and
Koustabh Ghosh +2 more
doaj +1 more source
Finding state-of-the-art non-cryptographic hashes with genetic programming [PDF]
Proceding of: 9th International Conference, Reykjavik, Iceland, September 9-13, 2006.The design of non-cryptographic hash functions by means of evolutionary computation is a relatively new and unexplored problem.
Estébanez Tascón, César +3 more
core +2 more sources
A new hash function and its use in read mapping on genome [PDF]
Mapping reads onto genomes is an indispensable step in sequencing data analysis. A widely used method to speed up mapping is to index a genome by a hash table, in which genomic positions of $k$-mers are stored in the table.
Farzaneh Salari +2 more
doaj +1 more source
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Tomasz Bilski +3 more
openaire +2 more sources
Analysis of the amplitude form of the quantum hash function
In this article, the properties of quantum hash functions are further explored. Previous findings show that so-called small-bias sets (special subsets of the set of elements of a cyclic group) generate a “phase” quantum hash function. Here, it was proved
M. F. Ablayev +2 more
doaj +1 more source

