Results 81 to 90 of about 123,105 (127)
Resource-efficient implementation of Blue Midnight Wish-256 hash function on Xilinx FPGA platform [PDF]
Mohamed El-Hadedy+3 more
openalex +1 more source
One-way Hash Function Based on Neural Network
Shiguo Lian, Jinsheng Sun, Zhiquan Wang
openalex +2 more sources
Cryptanalysis of Lin et al.'s Efficient Block-Cipher-Based Hash Function [PDF]
Bozhong Liu+4 more
openalex +1 more source
Construction of universal one-way hash functions: Tree hashing revisited
Palash Sarkar
openalex +1 more source
Protocol of Secure Key Distribution Using Hash Functions and Quantum Authenticated Channels (KDP-6DP) [PDF]
Majeed
openalex +1 more source
On Randomness in Hash Functions
In the talk, we shall discuss quality measures for hash functions used in data structures and algorithms, and survey positive and negative results. (This talk is not about cryptographic hash functions.) For the analysis of algorithms involving hash functions, it is often convenient to assume the hash functions used behave fully randomly; in some cases ...
openaire +2 more sources
Attacks on Hash Functions Based on Generalized Feistel: Application to Reduced-Round Lesamnta and SHAvite-3 512 [PDF]
Charles Bouillaguet+3 more
openalex +1 more source