Results 21 to 30 of about 13,015 (291)
Theoretical and Experimental Analysis of Cryptographic Hash Functions
The paper presents a theoretical introduction to the cryptographic hash function theory and a statistical experimental analysis of selected hash functions.
Jacek Tchórzewsk+1 more
doaj +1 more source
HMNT: Hash Function Based on New Mersenne Number Transform
In the field of information security, hash functions are considered important as they are used to ensure message integrity and authentication. Despite various available methods to design hash functions, the methods have been proven to time inefficient ...
Ali Maetouq, Salwani Mohd Daud
doaj +1 more source
EliMAC: Speeding Up LightMAC by around 20%
Universal hash functions play a prominent role in the design of message authentication codes and the like. Whereas it is known how to build highly efficient sequential universal hash functions, parallel non-algebraic universal hash function designs are ...
Christoph Dobraunig+2 more
doaj +1 more source
Merkle-Damgård Construction Method and Alternatives: A Review
Cryptographic hash function is an important cryptographic tool in the field of information security. Design of most widely used hash functions such as MD5 and SHA-1 is based on the iterations of compression function by Merkle-Damgård construction method ...
Harshvardhan Tiwari
doaj +1 more source
How opposing ideological groups use online interactions to justify and mobilise collective action
Abstract The purpose of this pre‐registered study was to investigate how different ideological groups justified and mobilised collective action online. We collected 6878 posts from the social media accounts of pro‐Black Lives Matter (n = 13) and anti‐Black Lives Matter (n = 9) groups who promoted collective action in the month after George Floyd's ...
Olivia Brown+2 more
wiley +1 more source
We evaluate the biogeomorphological impacts of seaweed on materials commonly used in maritime built heritage restoration. After 6 months of exposure to intertidal conditions, we found no evidence of enhanced deterioration of mortar prepared using natural cement when covered with seaweed compared to uncovered mortar.
Timothy Baxter+2 more
wiley +1 more source
Challenging the increased resistance of regular hash functions against birthday attacks
At Eurocrypt 2004, Bellare and Kohno presented the concept of a regular hash function. For a hash function to be regular, every hash value must have the same number of preimages in the domain.
Mouha Nicky, Sekar Gautham, Preneel Bart
doaj +1 more source
New Zémor-Tillich Type Hash Functions Over GL2 (𝔽pn)
We present a large class of new Zémor-Tillich type hash functions whose target space is the finite group GL2(𝔽pn) for any prime p and power n. To do so, we use a novel group-theoretic approach that uses Tits’ “Ping-Pong Lemma” to outline conditions under
Tomkins Hayley+2 more
doaj +1 more source
Abstract Adult T‐cell leukemia/lymphoma (ATL) patients have a very poor prognosis. The humanized anti‐CCR4 therapeutic monoclonal antibody, mogamulizumab, is a key agent for ATL treatment. Our previous integrated molecular analysis demonstrated that among all the driver genes in ATL, CCR7 gene alterations were significantly associated with clinical ...
Yuma Sakamoto+17 more
wiley +1 more source
Hash functions for priority queues
The complexity of priority queue operations is analyzed with respect to the cell probe computational model of A. Yao (J. Assoc. Comput. Mach. 28, No. 3 (1981), 615–628). A method utilizing families of hash functions is developed which permits priority queue operations to be implemented in constant worst-case time provided that a size constraint is ...
M. Fredman, János Komlós, M. Ajtai
openaire +3 more sources