Results 21 to 30 of about 157,357 (284)

Theoretical and Experimental Analysis of Cryptographic Hash Functions

open access: yesJournal of Telecommunications and Information Technology, 2019
The paper presents a theoretical introduction to the cryptographic hash function theory and a statistical experimental analysis of selected hash functions.
Jacek Tchórzewsk   +1 more
doaj   +1 more source

Integrity verification for digital Holy Quran verses using cryptographic hash function and compression

open access: yesJournal of King Saud University: Computer and Information Sciences, 2020
Data Integrity is one of the primary concepts in information security. The main task of the cryptographic hash function is to assure the integrity of the transmitted data.
Mishal Almazrooie   +5 more
doaj   +1 more source

Fully pipelined bloom filter architecture [PDF]

open access: yes, 2008
Recently, we proposed a two-stage pipelined Bloom filter architecture to save power for network security applications. In this letter, we generalize the pipelined Bloom filter architecture to k-stage and show that significant power savings can be ...
Koçak, T, Paynter, M
core   +2 more sources

Non-Relaxation Deep Hashing Method for Fast Image Retrieval

open access: yesIEEE Access, 2023
Deep hashing methods utilize an end-to-end framework to mutually learn feature representations and hash codes, thereby achieving a better retrieval performance.
Xiaofei Li
doaj   +1 more source

The exponential hash function

open access: yesACM Journal of Experimental Algorithmics, 1997
In this paper an efficient open address hash function called exponential hashing is developed. The motivation for this hash function resulted from our ongoing efforts to apply dynamical systems theory to the study of hashing; however, the analysis conducted in this paper is primarily based on traditional number theory. Proofs of optimal table parameter
Bradley J. Smith   +2 more
openaire   +2 more sources

Cryptanalysis of the Tiger Hash Function [PDF]

open access: yes, 2007
Tiger is a cryptographic hash function with a 192-bit hash value. It was proposed by Anderson and Biham in 1996. Recently, weaknesses have been shown in round-reduced variants of the Tiger hash function. First, at FSE 2006, Kelsey and Lucks presented a collision attack on Tiger reduced to 16 and 17 (out of 24) rounds with a complexity of about 244 and ...
Mendel, Florian, Rijmen, Vincent
openaire   +2 more sources

Design and Analysis of New Version of Cryptographic Hash Function Based on Improved Chaotic Maps With Induced DNA Sequences

open access: yesIEEE Access, 2023
One of the first and most used hashing algorithms in blockchains is SHA-256 so the main aim of this paper is how to increase the security level of the blockchain based on the increasing hashing algorithm security.
Salwa M. Serag Eldin   +7 more
doaj   +1 more source

Programmable Hash Functions and Their Applications [PDF]

open access: yesJournal of Cryptology, 2008
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Dennis Hofheinz, Eike Kiltz
openaire   +3 more sources

Challenging the increased resistance of regular hash functions against birthday attacks

open access: yesJournal of Mathematical Cryptology, 2012
At Eurocrypt 2004, Bellare and Kohno presented the concept of a regular hash function. For a hash function to be regular, every hash value must have the same number of preimages in the domain.
Mouha Nicky, Sekar Gautham, Preneel Bart
doaj   +1 more source

A secure and efficient cryptographic hash function based on NewFORK-256

open access: yesEgyptian Informatics Journal, 2012
Cryptographic hash functions serve as a fundamental building block of information security and are used in numerous security applications and protocols such as digital signature schemes, construction of MAC and random number generation, for ensuring data
Harshvardhan Tiwari, Krishna Asawa
doaj   +1 more source

Home - About - Disclaimer - Privacy