Results 11 to 20 of about 1,492,941 (204)
Quantum hashing and Fourier transform
In the paper based on the notion of small-biased sets we define the quantum transformation that describes the quantum hash function over the cyclic group.
F. Ablayev, Alexander Vasiliev
semanticscholar +2 more sources
On the concept of cryptographic quantum hashing [PDF]
In the letter we define the notion of a quantum resistant ((ϵ,δ) ?>-resistant) hash function which consists of a combination of pre-image (one-way) resistance (ε-resistance) and collision resistance (δ-resistance) properties.
F. Ablayev, M. Ablayev
semanticscholar +6 more sources
On the balanced quantum hashing
In the paper we define a notion of a resistant quantum hash function which combines a notion of pre-image (one-way) resistance and the notion of collision resistance.
F. Ablayev, M. Ablayev, A. Vasiliev
semanticscholar +4 more sources
Quantum security of hash functions and property-preservation of iterated hashing [PDF]
This work contains two major parts: comprehensively studying the security notions of cryptographic hash functions against quantum attacks and the relationships between them; and revisiting whether Merkle-Damgard and related iterated hash constructions ...
Benjamin J Hamlin, F. Song
semanticscholar +4 more sources
Quantum-inspired improved African vultures optimization algorithm for efficient placement of IoT service in edge computing environment [PDF]
The emergence of 5G networks has led to development of Edge Computing (EC) environments, which offer improved support for applications that rely on the Internet of Things (IoT).
B. Panjavarnam +3 more
doaj +2 more sources
Efficient Algorithms for Quantum Hashing
Quantum hashing is a useful technique that allows us to construct memory-efficient algorithms and secure quantum protocols. First, we present a circuit that implements the phase form of quantum hashing using $2^{n-1}$ CNOT gates, where n is the number of
I. Zinnatullin, K. Khadiev
semanticscholar +3 more sources
Haraka v2 – Efficient Short-Input Hashing for Post-Quantum Applications
Recently, many efficient cryptographic hash function design strategies have been explored, not least because of the SHA-3 competition. These designs are, almost exclusively, geared towards high performance on long inputs.
Stefan Kölbl +3 more
doaj +2 more sources
On Quantum Fingerprinting and Quantum Cryptographic Hashing
Fingerprinting and cryptographic hashing have quite different usages in computer science, but have similar properties. Interpretation of their properties is determined by the area of their usage: fingerprinting methods are methods for constructing ...
F. Ablayev, M. Ablayev
semanticscholar +4 more sources
Quantum Amplitude Hash Function for Quantum Evidence Integrity
The integrity of evidence, a core principle of digital forensics, is essential for ensuring the reliability and admissibility of evidence in legal proceedings.
Donggun Lee, Hanbeom Shin, Seokhie Hong
doaj +2 more sources
Chip-integrated quantum signature network over 200 km [PDF]
The development of quantum networks is paramount towards practical and secure communications. Quantum digital signatures (QDS) offer an information-theoretically secure solution for ensuring data integrity, authenticity, and non-repudiation, rapidly ...
Yongqiang Du +9 more
doaj +2 more sources

