Results 211 to 220 of about 10,388,112 (269)
Some of the next articles are maybe not open access.

Cryptographic Hash Functions

2020
Don't get intimidated by the title of this chapter. The theory of cryptographic hash functions is not particularly abstruse. What is difficult is the construction of these functions from scratch. However, we need not concern ourselves with this aspect of the mathematical theory since most programming language libraries provide us with a good selection ...
openaire   +2 more sources

Does Fiat-Shamir Require a Cryptographic Hash Function?

IACR Cryptology ePrint Archive, 2020
Yilei Chen   +3 more
semanticscholar   +1 more source

Hash Functions

2021
Marius Iulian Mihailescu   +1 more
openaire   +1 more source

Cryptanalysis of T-Function-Based Hash Functions

2006
T-functions are a useful new tool to design symmetric-key algorithms, introduced by Klimov and Shamir in 2002. They have already been used to build stream ciphers and new applications for block ciphers and hash functions have been recently suggested. In this paper, we analyze the security of several possible constructions of hash functions, based on
Frédéric Muller, Thomas Peyrin
openaire   +2 more sources

A novel hash function based fragile watermarking method for image integrity

Multimedia tools and applications, 2019
Ertugrul Gul, Serkan Öztürk
semanticscholar   +1 more source

Universal hash functions for an infinite universe and hash trees

Information Processing Letters, 2009
In this note we describe the adaptation of the universal hashing idea to an infinite universe, and to prefix hash trees. These are a structure underlying all extendible hash methods, which have up to now only been studied under the uniform hashing assumption.
openaire   +2 more sources

A chaos-based keyed hash function based on fixed point representation

Cluster Computing, 2018
J. Teh, K. Tan, Moatsum Alawida
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy