Results 81 to 85 of about 750 (85)
Some of the next articles are maybe not open access.
(Pseudo-) Preimage Attacks on Step-Reduced HAS-160 and RIPEMD-160
2014The hash function HAS-160 is standardized by the Korean government and widely used in Korea, and the hash function RIPEMD-160 is a worldwide ISO/IEC standard. In this paper, by careful analysis of the two hash functions, we propose a pseudo-preimage attack on 71-step HAS-160 (no padding) with complexity 2158.13 and a preimage attack on 34-step RIPEMD ...
Gaoli Wang, Yanzhao Shen
openaire +1 more source
Synthesis of an Application Specific Instruction Set Processor (ASIP) for RIPEMD-160 Hash Algorithm
International Journal of Electronics Letters, 2018ABSTRACTHash functions are vital tasks in many applications such as digital fingerprinting, Internet communications, bank transactions and so forth. RACE Integrity Primitives Evaluation Message Digest-160 (RIPEMD-160) is one of the most applicable hash functions that there have been several structures for designing it based on Application-Specific ...
openaire +1 more source
Artificial Intelligence, Soft Computing And Application Trends 2025
Advancements in communication and storage technologies need robust encryption tools to protect data. Cryptographic hash functions are crucial in maintaining data integrity and security by turning variable-length inputs into fixed-size digests. RIPEMD-160 is a popular hash algorithm that balances speed and security.
Suparn Padma Patra, Mamta Rani
openaire +1 more source
Advancements in communication and storage technologies need robust encryption tools to protect data. Cryptographic hash functions are crucial in maintaining data integrity and security by turning variable-length inputs into fixed-size digests. RIPEMD-160 is a popular hash algorithm that balances speed and security.
Suparn Padma Patra, Mamta Rani
openaire +1 more source
A Unified Architecture of MD5 and PIPEMD 160 Hash Algorithms
2007published_or_final_version
Ng, TS, Ng, CW, Yip, KW
openaire +2 more sources

