Results 41 to 50 of about 157,357 (284)

Extended integer tent maps and dynamic hash function

open access: yesTongxin xuebao, 2010
Based on the analysis of uniform distribution property of the extended integer tent maps,a novel dynamic hash function with the output length of 160bit was constructed.In addition,the MD structure was improved so that the capacity of collision resistance
LIU Jian-dong
doaj   +2 more sources

A Fast Single-Key Two-Level Universal Hash Function

open access: yesIACR Transactions on Symmetric Cryptology, 2017
Universal hash functions based on univariate polynomials are well known, e.g. Poly1305 and GHASH. Using Horner’s rule to evaluate such hash functionsrequire l − 1 field multiplications for hashing a message consisting of l blocks where each block is one ...
Debrup Chakraborty   +2 more
doaj   +1 more source

The Lane hash function

open access: yes, 2009
We propose the cryptographic hash function Lane as a candidate for the SHA-3 competition organised by NIST. Lane is an iterated hash function supporting multiple digest sizes. Components of the AES block cipher are reused as building blocks. Lane aims to be secure, easy to understand, elegant and flexible in implementation.
Indesteege, Sebastiaan   +7 more
openaire   +4 more sources

Synonym‐based multi‐keyword ranked search with secure k‐NN in 6G network

open access: yesIET Networks, EarlyView., 2022
Abstract Sixth Generation (6G) integrates the next generation communication systems such as maritime, terrestrial, and aerial to offer robust network and massive device connectivity with ultra‐low latency requirement. The cutting edge technologies such as artificial intelligence, quantum machine learning, and millimetre enable hyper‐connectivity to ...
Deebak Bakkiam David, Fadi Al‐Turjman
wiley   +1 more source

Simple Tabulation, Fast Expanders, Double Tabulation, and High Independence

open access: yes, 2013
Simple tabulation dates back to Zobrist in 1970. Keys are viewed as c characters from some alphabet A. We initialize c tables h_0, ..., h_{c-1} mapping characters to random hash values.
Thorup, Mikkel
core   +1 more source

Perceived Impacts and Predictors of Cannabis Products used by Rheumatology Patients in Alberta: A Multivariable Analysis of Cross‐sectional Survey Data

open access: yesArthritis Care &Research, Accepted Article.
Objective This study aimed to characterize cannabis product choices (cannabinoid content and formulation) among rheumatology patients, and their associations with patient factors, patient reported perceived side effects and positive impacts. Methods An online survey (delivered from March to November 2022) was distributed by Alberta Health Services to ...
Susan Zhang   +10 more
wiley   +1 more source

Trigonometric words ranking model for spam message classification

open access: yesIET Networks, EarlyView., 2022
Abstract The significant increase in the volume of fake (spam) messages has led to an urgent need to develop and implement a robust anti‐spam method. Several of the current anti‐spam systems depend mainly on the word order of the message in determining the spam message, which results in the system's inability to predict the correct type of message when
Suha Mohammed Hadi   +7 more
wiley   +1 more source

One-way hash function with chaotic dynamic parameters

open access: yesTongxin xuebao, 2008
A novel keyed one-way hash function based on chaotic dynamic parameters was presented which combines the advantage of both chaotic system and conventional one-way hash function.In the proposed approach the fixed parameters of conventional hash function ...
GUO Wei1   +3 more
doaj   +2 more sources

HMNT: Hash Function Based on New Mersenne Number Transform

open access: yesIEEE Access, 2020
In the field of information security, hash functions are considered important as they are used to ensure message integrity and authentication. Despite various available methods to design hash functions, the methods have been proven to time inefficient ...
Ali Maetouq, Salwani Mohd Daud
doaj   +1 more source

EliMAC: Speeding Up LightMAC by around 20%

open access: yesIACR Transactions on Symmetric Cryptology, 2023
Universal hash functions play a prominent role in the design of message authentication codes and the like. Whereas it is known how to build highly efficient sequential universal hash functions, parallel non-algebraic universal hash function designs are ...
Christoph Dobraunig   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy