Results 241 to 250 of about 15,333 (299)

Instantiating the Hash-then-evaluate paradigm: Strengthening PRFs, PCFs, and OPRFs. [PDF]

open access: yesCryptogr Commun
Brzuska C   +4 more
europepmc   +1 more source

Collisions for Schnorr's hash function FFT-hash

open access: yes, 1993
Daemen, Joan   +3 more
openaire   +1 more source

Linear hash functions

Journal of the ACM, 1999
Consider the set ℋ of all linear (or affine) transformations between two vector spaces over a finite field F . We study how good ℋ is as a class of hash functions, namely we consider hashing a set S of size n into a range having the same cardinality n
Alon, Noga   +4 more
openaire   +2 more sources

MGR Hash Functions

Cryptologia, 2019
GOST-R 34.11-94 is a Russian standard cryptographic hash function that was introduced in 1994 by the Russian Federal Agency for the purposes of information processing, information security, and dig...
Khushboo Bussi   +3 more
openaire   +1 more source

Iterated Hash Functions

2021
So far we have studied various hash function properties as well as use cases of hash functions. When unkeyed or used with a public key, hash functions can be collision resistant, second-preimage resistant, or one-way.
Arno Mittelbach, Marc Fischlin
openaire   +1 more source

RC hash function

Journal of Information and Optimization Sciences, 2001
RC6 was a candidate encryption algorithm for AES selections which emphasizes on the security, simplicity and performance of the algorithm. The round keys of RC6 are generated from the input key words by a certain amount of “one-way” according to the authors’ claims.
Yi-Shiung Yeh, Jue-Sam Chou
openaire   +1 more source

Cryptographic Hash Functions [PDF]

open access: possible, 2009
Kryptografiske hashfunktioner anvendes i mange forskellige områder inden for kryptografi: i digitale signatursystemer og i såkaldt public‐key kryptografi, til passwordbeskyttelse og autentificering af beskeder, til dannelse af kryptografiske nøgler og tilfældige tal, osv.
openaire   +2 more sources

Cryptographic Hash Function

2015
Cryptographic hash function verifies data integrity and sender identity or source of information. The task is accomplished by taking a variable bit patterns as an input then produces a fixed bit patterns of output. This chapter provides a detailed overview to include classification, properties, constructions, attacks, applications and an overview of a ...
Imad Fakhri Alshaikhli   +1 more
openaire   +1 more source

Home - About - Disclaimer - Privacy