Results 11 to 20 of about 157,357 (284)

A Novel Hash Function Based on a Chaotic Sponge and DNA Sequence

open access: yesIEEE Access, 2021
Many chaos-based hash functions have convoluted designs that are not based on proper design principles, complicating the verification of security claims.
Moatsum Alawida   +5 more
doaj   +1 more source

The Grindahl Hash Functions [PDF]

open access: yes, 2007
In this paper we propose the Grindahl hash functions, which are based on components of the Rijndael algorithm. To make collision search sufficiently difficult, this design has the important feature that no low-weight characteristics form collisions, and at the same time it limits access to the state.
Lars R. Knudsen   +2 more
openaire   +1 more source

Optimization of Tree Modes for Parallel Hash Functions: A Case Study [PDF]

open access: yes, 2017
This paper focuses on parallel hash functions based on tree modes of operation for an inner Variable-Input-Length function. This inner function can be either a single-block-length (SBL) and prefix-free MD hash function, or a sponge-based hash function ...
Atighehchi, Kevin, Rolland, Robert
core   +1 more source

Merkle-Damgård Construction Method and Alternatives: A Review

open access: yesJournal of Information and Organizational Sciences, 2017
Cryptographic hash function is an important cryptographic tool in the field of information security. Design of most widely used hash functions such as MD5 and SHA-1 is based on the iterations of compression function by Merkle-Damgård construction method ...
Harshvardhan Tiwari
doaj   +1 more source

Supervised Matrix Factorization Hashing With Quantitative Loss for Image-Text Search

open access: yesIEEE Access, 2020
Image-text hashing approaches have been widely applied in large-scale similarity search applications due to their efficiency in both search speed and storage efficiency.
Huan Zhao   +3 more
doaj   +1 more source

Multimixer-128: Universal Keyed Hashing Based on Integer Multiplication

open access: yesIACR Transactions on Symmetric Cryptology, 2023
In this paper we introduce a new keyed hash function based on 32-bit integer multiplication that we call Multimixer-128. In our approach, we follow the key-then-hash parallel paradigm. So, we first add a variable length input message to a secret key and
Koustabh Ghosh   +2 more
doaj   +1 more source

Finding state-of-the-art non-cryptographic hashes with genetic programming [PDF]

open access: yes, 2006
Proceding of: 9th International Conference, Reykjavik, Iceland, September 9-13, 2006.The design of non-cryptographic hash functions by means of evolutionary computation is a relatively new and unexplored problem.
Estébanez Tascón, César   +3 more
core   +2 more sources

A new hash function and its use in read mapping on genome [PDF]

open access: yesAUT Journal of Mathematics and Computing, 2020
Mapping reads onto genomes is an indispensable step in sequencing data analysis. A widely used method to speed up mapping is to index a genome by a hash table, in which genomic positions of $k$-mers are stored in the table.
Farzaneh Salari   +2 more
doaj   +1 more source

Parameterized Hash Functions

open access: yesAnnales UMCS, Informatica, 2012
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Tomasz Bilski   +3 more
openaire   +2 more sources

Analysis of the amplitude form of the quantum hash function

open access: yesУчёные записки Казанского университета: Серия Физико-математические науки, 2023
In this article, the properties of quantum hash functions are further explored. Previous findings show that so-called small-bias sets (special subsets of the set of elements of a cyclic group) generate a “phase” quantum hash function. Here, it was proved
M. F. Ablayev   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy