Results 1 to 10 of about 10,567,948 (244)
Designing Two Secure Keyed Hash Functions Based on Sponge Construction and the Chaotic Neural Network. [PDF]
Entropy (Basel), 2020In this paper, we propose, implement, and analyze the structures of two keyed hash functions using the Chaotic Neural Network (CNN). These structures are based on Sponge construction, and they produce two variants of hash value lengths, i.e., 256 and 512
Abdoun N+5 more
europepmc +2 more sources
Deep Cross-Modal Hashing with Hashing Functions and Unified Hash Codes Jointly Learning [PDF]
arXiv, 2019Due to their high retrieval efficiency and low storage cost, cross-modal hashing methods have attracted considerable attention. Generally, compared with shallow cross-modal hashing methods, deep cross-modal hashing methods can achieve a more satisfactory performance by integrating feature learning and hash codes optimizing into a same framework ...
Rong-Cheng Tu+6 more
arxiv +3 more sources
Synthetic and real data sets for benchmarking non-cryptographic hash functions. [PDF]
Data Brief, 2019The overall assessment of non-cryptographic functions is very complex and there is not a widely used benchmark. These data have been collected and created as a benchmark for testing non-cryptographic hash functions.
Saez Y+3 more
europepmc +2 more sources
A Hash of Hash Functions [PDF]
arXiv, 2003In this paper, we present a general review of hash functions in a cryptographic sense. We give special emphasis on some particular topics such as cipher block chaining message authentication code (CBC MAC) and its variants. This paper also broadens the information given in some well known surveys, by including more details on block-cipher based hash ...
arxiv +3 more sources
Perceptual Audio Hashing Functions [PDF]
EURASIP Journal on Advances in Signal Processing, 2005Perceptual hash functions provide a tool for fast and reliable identification of content. We present new audio hash functions based on summarization of the time-frequency spectral characteristics of an audio document.
Emin Anarım+3 more
doaj +4 more sources
The Usefulness of Multilevel Hash Tables with Multiple Hash Functions in Large Databases [PDF]
Ann. Univ. Tibiscus Comp. Sci. Series VII(2009),11-20, 2009In this work, attempt is made to select three good hash functions which uniformly distribute hash values that permute their internal states and allow the input bits to generate different output bits. These functions are used in different levels of hash tables that are coded in Java Programming Language and a quite number of data records serve as ...
A.T. Akinwale, F.T. Ibharalu
arxiv +2 more sources
Verification of Implementations of Cryptographic Hash Functions
IEEE Access, 2017Cryptographic hash functions have become the basis of modern network computing for identity authorization and secure computing; protocol consistency of cryptographic hash functions is one of the most important properties that affect the security and ...
Dexi Wang+5 more
doaj +2 more sources
The Grindahl Hash Functions [PDF]
, 2007In this paper we propose the Grindahl hash functions, which are based on components of the Rijndael algorithm. To make collision search sufficiently difficult, this design has the important feature that no low-weight characteristics form collisions, and at the same time it limits access to the state.
Lars R. Knudsen+2 more
openalex +4 more sources
Universal Classes of Hash Functions
Journal of Computer and System Sciences, 1979AbstractThis paper gives an input independent average linear time algorithm for storage and retrieval on keys. The algorithm makes a random choice of hash function from a suitable class of hash functions. Given any sequence of inputs the expected time (averaging over all functions in the class) to store and retrieve elements is linear in the length of ...
L. Carter, M. Wegman
semanticscholar +3 more sources
A secure and efficient cryptographic hash function based on NewFORK-256
Egyptian Informatics Journal, 2012Cryptographic hash functions serve as a fundamental building block of information security and are used in numerous security applications and protocols such as digital signature schemes, construction of MAC and random number generation, for ensuring data
Harshvardhan Tiwari, Krishna Asawa
doaj +2 more sources