Results 21 to 30 of about 13,015 (291)

Theoretical and Experimental Analysis of Cryptographic Hash Functions

open access: yesJournal of Telecommunications and Information Technology, 2019
The paper presents a theoretical introduction to the cryptographic hash function theory and a statistical experimental analysis of selected hash functions.
Jacek Tchórzewsk   +1 more
doaj   +1 more source

HMNT: Hash Function Based on New Mersenne Number Transform

open access: yesIEEE Access, 2020
In the field of information security, hash functions are considered important as they are used to ensure message integrity and authentication. Despite various available methods to design hash functions, the methods have been proven to time inefficient ...
Ali Maetouq, Salwani Mohd Daud
doaj   +1 more source

EliMAC: Speeding Up LightMAC by around 20%

open access: yesIACR Transactions on Symmetric Cryptology, 2023
Universal hash functions play a prominent role in the design of message authentication codes and the like. Whereas it is known how to build highly efficient sequential universal hash functions, parallel non-algebraic universal hash function designs are ...
Christoph Dobraunig   +2 more
doaj   +1 more source

Merkle-Damgård Construction Method and Alternatives: A Review

open access: yesJournal of Information and Organizational Sciences, 2017
Cryptographic hash function is an important cryptographic tool in the field of information security. Design of most widely used hash functions such as MD5 and SHA-1 is based on the iterations of compression function by Merkle-Damgård construction method ...
Harshvardhan Tiwari
doaj   +1 more source

How opposing ideological groups use online interactions to justify and mobilise collective action

open access: yesEuropean Journal of Social Psychology, Volume 52, Issue 7, Page 1082-1110, December 2022., 2022
Abstract The purpose of this pre‐registered study was to investigate how different ideological groups justified and mobilised collective action online. We collected 6878 posts from the social media accounts of pro‐Black Lives Matter (n = 13) and anti‐Black Lives Matter (n = 9) groups who promoted collective action in the month after George Floyd's ...
Olivia Brown   +2 more
wiley   +1 more source

No evidence that seaweed cover enhances the deterioration of natural cement‐based mortar in intertidal environments

open access: yesEarth Surface Processes and Landforms, Volume 47, Issue 15, Page 3453-3464, December 2022., 2022
We evaluate the biogeomorphological impacts of seaweed on materials commonly used in maritime built heritage restoration. After 6 months of exposure to intertidal conditions, we found no evidence of enhanced deterioration of mortar prepared using natural cement when covered with seaweed compared to uncovered mortar.
Timothy Baxter   +2 more
wiley   +1 more source

Challenging the increased resistance of regular hash functions against birthday attacks

open access: yesJournal of Mathematical Cryptology, 2012
At Eurocrypt 2004, Bellare and Kohno presented the concept of a regular hash function. For a hash function to be regular, every hash value must have the same number of preimages in the domain.
Mouha Nicky, Sekar Gautham, Preneel Bart
doaj   +1 more source

New Zémor-Tillich Type Hash Functions Over GL2 (𝔽pn)

open access: yesJournal of Mathematical Cryptology, 2020
We present a large class of new Zémor-Tillich type hash functions whose target space is the finite group GL2(𝔽pn) for any prime p and power n. To do so, we use a novel group-theoretic approach that uses Tits’ “Ping-Pong Lemma” to outline conditions under
Tomkins Hayley   +2 more
doaj   +1 more source

CCR7 alterations associated with inferior outcome of adult T‐cell leukemia/lymphoma under mogamulizumab treatment

open access: yesHematological Oncology, Volume 40, Issue 5, Page 876-884, December 2022., 2022
Abstract Adult T‐cell leukemia/lymphoma (ATL) patients have a very poor prognosis. The humanized anti‐CCR4 therapeutic monoclonal antibody, mogamulizumab, is a key agent for ATL treatment. Our previous integrated molecular analysis demonstrated that among all the driver genes in ATL, CCR7 gene alterations were significantly associated with clinical ...
Yuma Sakamoto   +17 more
wiley   +1 more source

Hash functions for priority queues

open access: yes24th Annual Symposium on Foundations of Computer Science (sfcs 1983), 1983
The complexity of priority queue operations is analyzed with respect to the cell probe computational model of A. Yao (J. Assoc. Comput. Mach. 28, No. 3 (1981), 615–628). A method utilizing families of hash functions is developed which permits priority queue operations to be implemented in constant worst-case time provided that a size constraint is ...
M. Fredman, János Komlós, M. Ajtai
openaire   +3 more sources

Home - About - Disclaimer - Privacy