Results 41 to 50 of about 10,638,853 (320)

Extended integer tent maps and dynamic hash function

open access: yesTongxin xuebao, 2010
Based on the analysis of uniform distribution property of the extended integer tent maps,a novel dynamic hash function with the output length of 160bit was constructed.In addition,the MD structure was improved so that the capacity of collision resistance
LIU Jian-dong
doaj   +2 more sources

A Fast Single-Key Two-Level Universal Hash Function

open access: yesIACR Transactions on Symmetric Cryptology, 2017
Universal hash functions based on univariate polynomials are well known, e.g. Poly1305 and GHASH. Using Horner’s rule to evaluate such hash functionsrequire l − 1 field multiplications for hashing a message consisting of l blocks where each block is one ...
Debrup Chakraborty   +2 more
doaj   +1 more source

EliMAC: Speeding Up LightMAC by around 20%

open access: yesIACR Transactions on Symmetric Cryptology, 2023
Universal hash functions play a prominent role in the design of message authentication codes and the like. Whereas it is known how to build highly efficient sequential universal hash functions, parallel non-algebraic universal hash function designs are ...
Christoph Dobraunig   +2 more
doaj   +1 more source

Byzantine Modification Detection in Multicast Networks With Random Network Coding [PDF]

open access: yes, 2008
An information-theoretic approach for detecting Byzantine or adversarial modifications in networks employing random linear network coding is described. Each exogenous source packet is augmented with a flexible number of hash symbols that are obtained as ...
Effros, Michelle   +5 more
core   +1 more source

HMNT: Hash Function Based on New Mersenne Number Transform

open access: yesIEEE Access, 2020
In the field of information security, hash functions are considered important as they are used to ensure message integrity and authentication. Despite various available methods to design hash functions, the methods have been proven to time inefficient ...
Ali Maetouq, Salwani Mohd Daud
doaj   +1 more source

Key recycling in authentication

open access: yes, 2014
In their seminal work on authentication, Wegman and Carter propose that to authenticate multiple messages, it is sufficient to reuse the same hash function as long as each tag is encrypted with a one-time pad.
Portmann, Christopher
core   +1 more source

The suffix-free-prefix-free hash function construction and its indifferentiability security analysis [PDF]

open access: yes, 2012
In this paper, we observe that in the seminal work on indifferentiability analysis of iterated hash functions by Coron et al. and in subsequent works, the initial value (IV) of hash functions is fixed.
Erik Zenner   +4 more
core   +2 more sources

Compression‐Tension‐Asymmetry and Stiffness Nonlinearity of Collagen‐Matrigel Composite Hydrogels

open access: yesAdvanced Healthcare Materials, EarlyView.
Self‐assembled collagen hydrogel matrices are widely used in tissue engineering applications. These matrices stiffen and contract laterally under tension due to fiber alignment and soften and collapse under compression due to fiber buckling. It is demonstrated that filler materials, such as Matrigel, linearize the mechanical behavior of collagen ...
David Böhringer   +9 more
wiley   +1 more source

One-way hash function with chaotic dynamic parameters

open access: yesTongxin xuebao, 2008
A novel keyed one-way hash function based on chaotic dynamic parameters was presented which combines the advantage of both chaotic system and conventional one-way hash function.In the proposed approach the fixed parameters of conventional hash function ...
GUO Wei1   +3 more
doaj   +2 more sources

Ranking-Based Deep Hashing Network for Image Retrieval

open access: yesIEEE Access, 2022
In large-scale image retrieval, the deep learning-based hashing methods have significantly progressed. However, most of the existing deep hashing methods still have the problems of low feature learning efficiency and weak ranking relationship ...
Zhisheng Zhang   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy