Results 11 to 20 of about 1,492,941 (204)

Quantum hashing and Fourier transform

open access: yesJournal of Physics: Conference Series, 2020
In the paper based on the notion of small-biased sets we define the quantum transformation that describes the quantum hash function over the cyclic group.
F. Ablayev, Alexander Vasiliev
semanticscholar   +2 more sources

On the concept of cryptographic quantum hashing [PDF]

open access: yesLaser Physics Letters, 2015
In the letter we define the notion of a quantum resistant ((ϵ,δ) ?>-resistant) hash function which consists of a combination of pre-image (one-way) resistance (ε-resistance) and collision resistance (δ-resistance) properties.
F. Ablayev, M. Ablayev
semanticscholar   +6 more sources

On the balanced quantum hashing

open access: yesJournal of Physics: Conference Series, 2016
In the paper we define a notion of a resistant quantum hash function which combines a notion of pre-image (one-way) resistance and the notion of collision resistance.
F. Ablayev, M. Ablayev, A. Vasiliev
semanticscholar   +4 more sources

Quantum security of hash functions and property-preservation of iterated hashing [PDF]

open access: yesPost-Quantum Cryptography, 2019
This work contains two major parts: comprehensively studying the security notions of cryptographic hash functions against quantum attacks and the relationships between them; and revisiting whether Merkle-Damgard and related iterated hash constructions ...
Benjamin J Hamlin, F. Song
semanticscholar   +4 more sources

Quantum-inspired improved African vultures optimization algorithm for efficient placement of IoT service in edge computing environment [PDF]

open access: yesScientific Reports
The emergence of 5G networks has led to development of Edge Computing (EC) environments, which offer improved support for applications that rely on the Internet of Things (IoT).
B. Panjavarnam   +3 more
doaj   +2 more sources

Efficient Algorithms for Quantum Hashing

open access: yesInternational Conference on Unconventional Computation and Natural Computation
Quantum hashing is a useful technique that allows us to construct memory-efficient algorithms and secure quantum protocols. First, we present a circuit that implements the phase form of quantum hashing using $2^{n-1}$ CNOT gates, where n is the number of
I. Zinnatullin, K. Khadiev
semanticscholar   +3 more sources

Haraka v2 – Efficient Short-Input Hashing for Post-Quantum Applications

open access: yesIACR Transactions on Symmetric Cryptology, 2017
Recently, many efficient cryptographic hash function design strategies have been explored, not least because of the SHA-3 competition. These designs are, almost exclusively, geared towards high performance on long inputs.
Stefan Kölbl   +3 more
doaj   +2 more sources

On Quantum Fingerprinting and Quantum Cryptographic Hashing

open access: yesAdvanced Technologies of Quantum Key Distribution, 2018
Fingerprinting and cryptographic hashing have quite different usages in computer science, but have similar properties. Interpretation of their properties is determined by the area of their usage: fingerprinting methods are methods for constructing ...
F. Ablayev, M. Ablayev
semanticscholar   +4 more sources

Quantum Amplitude Hash Function for Quantum Evidence Integrity

open access: yesIEEE Access
The integrity of evidence, a core principle of digital forensics, is essential for ensuring the reliability and admissibility of evidence in legal proceedings.
Donggun Lee, Hanbeom Shin, Seokhie Hong
doaj   +2 more sources

Chip-integrated quantum signature network over 200 km [PDF]

open access: yesLight: Science & Applications
The development of quantum networks is paramount towards practical and secure communications. Quantum digital signatures (QDS) offer an information-theoretically secure solution for ensuring data integrity, authenticity, and non-repudiation, rapidly ...
Yongqiang Du   +9 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy