Results 191 to 200 of about 10,388,112 (269)

Hash-One: a lightweight cryptographic hash function

open access: yesIET Information Security, 2016
The increased demand for lightweight applications has triggered the need for appropriate security mechanisms in them. Lightweight cryptographic hash functions are among the major responses toward such a requirement.
Puliparambil Megha Mukundan   +3 more
semanticscholar   +3 more sources

Linear hash functions [PDF]

open access: possibleJournal of the ACM, 1999
Consider the set ℋ of all linear (or affine) transformations between two vector spaces over a finite field F . We study how good ℋ is as a class of hash functions, namely we consider hashing a set S of size n into a range having the same cardinality n
Alon, Noga   +4 more
openaire   +2 more sources

MGR Hash Functions

Cryptologia, 2019
GOST-R 34.11-94 is a Russian standard cryptographic hash function that was introduced in 1994 by the Russian Federal Agency for the purposes of information processing, information security, and dig...
Dhananjoy Dey   +3 more
openaire   +2 more sources

Iterated Hash Functions

2021
So far we have studied various hash function properties as well as use cases of hash functions. When unkeyed or used with a public key, hash functions can be collision resistant, second-preimage resistant, or one-way.
Marc Fischlin, Arno Mittelbach
openaire   +2 more sources

Choosing Best Hashing Strategies and Hash Functions [PDF]

open access: possible2009 IEEE International Advance Computing Conference, 2009
The paper gives the guideline to choose a best suitable hashing method hash function for a particular problem. After studying the various problem we find some criteria has been found to predict the best hash method and hash function for that problem. We present six suitable various classes of hash functions in which most of the problems can find their ...
Deepak Garg, Mahima Singh
openaire   +1 more source

Learning to hash: forgiving hash functions and applications

Data Mining and Knowledge Discovery, 2008
The problem of efficiently finding similar items in a large corpus of high-dimensional data points arises in many real-world tasks, such as music, image, and video retrieval. Beyond the scaling difficulties that arise with lookups in large data sets, the complexity in these domains is exacerbated by an imprecise definition of similarity. In this paper,
Shumeet Baluja, Michele Covell
openaire   +2 more sources

Cryptographic Hash Functions [PDF]

open access: possible, 2001
In this chapter, we discuss cryptographic hash functions. They are used, for example, in digital signatures. Throughout this chapter, we assume that Σ is an alphabet.
openaire   +1 more source

RC hash function

Journal of Information and Optimization Sciences, 2001
RC6 was a candidate encryption algorithm for AES selections which emphasizes on the security, simplicity and performance of the algorithm. The round keys of RC6 are generated from the input key words by a certain amount of “one-way” according to the authors’ claims.
Yi-Shiung Yeh, Jue-Sam Chou
openaire   +2 more sources

Trapdoor Hash Functions and Their Applications

2019
We introduce a new primitive, called trapdoor hash functions (TDH), which are hash functions H : {0, 1}n → {0, 1} λ with additional trapdoor function-like properties. Specifically, given an index i ∈ [n], TDHs allow for sampling an encoding key ek (that hides i) along with a corresponding trapdoor.
Dottling N.   +5 more
openaire   +3 more sources

Poseidon2: A Faster Version of the Poseidon Hash Function

IACR Cryptology ePrint Archive, 2023
Lorenzo Grassi   +2 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy