Results 1 to 10 of about 10,567,948 (244)

Designing Two Secure Keyed Hash Functions Based on Sponge Construction and the Chaotic Neural Network. [PDF]

open access: yesEntropy (Basel), 2020
In this paper, we propose, implement, and analyze the structures of two keyed hash functions using the Chaotic Neural Network (CNN). These structures are based on Sponge construction, and they produce two variants of hash value lengths, i.e., 256 and 512
Abdoun N   +5 more
europepmc   +2 more sources

Deep Cross-Modal Hashing with Hashing Functions and Unified Hash Codes Jointly Learning [PDF]

open access: yesarXiv, 2019
Due to their high retrieval efficiency and low storage cost, cross-modal hashing methods have attracted considerable attention. Generally, compared with shallow cross-modal hashing methods, deep cross-modal hashing methods can achieve a more satisfactory performance by integrating feature learning and hash codes optimizing into a same framework ...
Rong-Cheng Tu   +6 more
arxiv   +3 more sources

Synthetic and real data sets for benchmarking non-cryptographic hash functions. [PDF]

open access: yesData Brief, 2019
The overall assessment of non-cryptographic functions is very complex and there is not a widely used benchmark. These data have been collected and created as a benchmark for testing non-cryptographic hash functions.
Saez Y   +3 more
europepmc   +2 more sources

A Hash of Hash Functions [PDF]

open access: yesarXiv, 2003
In this paper, we present a general review of hash functions in a cryptographic sense. We give special emphasis on some particular topics such as cipher block chaining message authentication code (CBC MAC) and its variants. This paper also broadens the information given in some well known surveys, by including more details on block-cipher based hash ...
arxiv   +3 more sources

Perceptual Audio Hashing Functions [PDF]

open access: yesEURASIP Journal on Advances in Signal Processing, 2005
Perceptual hash functions provide a tool for fast and reliable identification of content. We present new audio hash functions based on summarization of the time-frequency spectral characteristics of an audio document.
Emin Anarım   +3 more
doaj   +4 more sources

The Usefulness of Multilevel Hash Tables with Multiple Hash Functions in Large Databases [PDF]

open access: yesAnn. Univ. Tibiscus Comp. Sci. Series VII(2009),11-20, 2009
In this work, attempt is made to select three good hash functions which uniformly distribute hash values that permute their internal states and allow the input bits to generate different output bits. These functions are used in different levels of hash tables that are coded in Java Programming Language and a quite number of data records serve as ...
A.T. Akinwale, F.T. Ibharalu
arxiv   +2 more sources

Verification of Implementations of Cryptographic Hash Functions

open access: yesIEEE Access, 2017
Cryptographic hash functions have become the basis of modern network computing for identity authorization and secure computing; protocol consistency of cryptographic hash functions is one of the most important properties that affect the security and ...
Dexi Wang   +5 more
doaj   +2 more sources

The Grindahl Hash Functions [PDF]

open access: bronze, 2007
In this paper we propose the Grindahl hash functions, which are based on components of the Rijndael algorithm. To make collision search sufficiently difficult, this design has the important feature that no low-weight characteristics form collisions, and at the same time it limits access to the state.
Lars R. Knudsen   +2 more
openalex   +4 more sources

Universal Classes of Hash Functions

open access: yesJournal of Computer and System Sciences, 1979
AbstractThis paper gives an input independent average linear time algorithm for storage and retrieval on keys. The algorithm makes a random choice of hash function from a suitable class of hash functions. Given any sequence of inputs the expected time (averaging over all functions in the class) to store and retrieve elements is linear in the length of ...
L. Carter, M. Wegman
semanticscholar   +3 more sources

A secure and efficient cryptographic hash function based on NewFORK-256

open access: goldEgyptian Informatics Journal, 2012
Cryptographic hash functions serve as a fundamental building block of information security and are used in numerous security applications and protocols such as digital signature schemes, construction of MAC and random number generation, for ensuring data
Harshvardhan Tiwari, Krishna Asawa
doaj   +2 more sources

Home - About - Disclaimer - Privacy