Results 311 to 320 of about 10,475,631 (365)
Some of the next articles are maybe not open access.

Does Fiat-Shamir Require a Cryptographic Hash Function?

IACR Cryptology ePrint Archive, 2020
Yilei Chen   +3 more
semanticscholar   +1 more source

Hash Functions

2021
Marius Iulian Mihailescu   +1 more
openaire   +1 more source

Cryptographic Hash Functions

2020
Don't get intimidated by the title of this chapter. The theory of cryptographic hash functions is not particularly abstruse. What is difficult is the construction of these functions from scratch. However, we need not concern ourselves with this aspect of the mathematical theory since most programming language libraries provide us with a good selection ...
openaire   +2 more sources

A novel hash function based fragile watermarking method for image integrity

Multimedia tools and applications, 2019
Ertugrul Gul, Serkan Öztürk
semanticscholar   +1 more source

Cryptanalysis of T-Function-Based Hash Functions

2006
T-functions are a useful new tool to design symmetric-key algorithms, introduced by Klimov and Shamir in 2002. They have already been used to build stream ciphers and new applications for block ciphers and hash functions have been recently suggested. In this paper, we analyze the security of several possible constructions of hash functions, based on
Frédéric Muller, Thomas Peyrin
openaire   +2 more sources

A chaos-based keyed hash function based on fixed point representation

Cluster Computing, 2018
J. Teh, K. Tan, Moatsum Alawida
semanticscholar   +1 more source

Hash Function Based on Quantum Walks

International Journal of Theoretical Physics, 2019
Yuguang Yang   +4 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy