Results 211 to 220 of about 10,388,112 (269)
Some of the next articles are maybe not open access.
2020
Don't get intimidated by the title of this chapter. The theory of cryptographic hash functions is not particularly abstruse. What is difficult is the construction of these functions from scratch. However, we need not concern ourselves with this aspect of the mathematical theory since most programming language libraries provide us with a good selection ...
openaire +2 more sources
Don't get intimidated by the title of this chapter. The theory of cryptographic hash functions is not particularly abstruse. What is difficult is the construction of these functions from scratch. However, we need not concern ourselves with this aspect of the mathematical theory since most programming language libraries provide us with a good selection ...
openaire +2 more sources
Unkeyed hash function based on chaotic sponge construction and fixed-point arithmetic
Nonlinear dynamics, 2020J. Teh, Moatsum Alawida, Jia Jie Ho
semanticscholar +1 more source
Does Fiat-Shamir Require a Cryptographic Hash Function?
IACR Cryptology ePrint Archive, 2020Yilei Chen+3 more
semanticscholar +1 more source
Cryptanalysis of T-Function-Based Hash Functions
2006T-functions are a useful new tool to design symmetric-key algorithms, introduced by Klimov and Shamir in 2002. They have already been used to build stream ciphers and new applications for block ciphers and hash functions have been recently suggested. In this paper, we analyze the security of several possible constructions of hash functions, based on
Frédéric Muller, Thomas Peyrin
openaire +2 more sources
A novel hash function based fragile watermarking method for image integrity
Multimedia tools and applications, 2019Ertugrul Gul, Serkan Öztürk
semanticscholar +1 more source
Universal hash functions for an infinite universe and hash trees
Information Processing Letters, 2009In this note we describe the adaptation of the universal hashing idea to an infinite universe, and to prefix hash trees. These are a structure underlying all extendible hash methods, which have up to now only been studied under the uniform hashing assumption.
openaire +2 more sources
A chaos-based keyed hash function based on fixed point representation
Cluster Computing, 2018J. Teh, K. Tan, Moatsum Alawida
semanticscholar +1 more source