Results 91 to 100 of about 2,695,884 (227)

A Secure Hash Function MD-192 With Modified Message Expansion [PDF]

open access: yesarXiv, 2010
Cryptographic hash functions play a central role in cryptography. Hash functions were introduced in cryptology to provide message integrity and authentication. MD5, SHA1 and RIPEMD are among the most commonly used message digest algorithm. Recently proposed attacks on well known and widely used hash functions motivate a design of new stronger hash ...
arxiv  

An Efficient Cryptographic Hash Algorithm (BSA) [PDF]

open access: yesIn Proceedings of The 10th National Workshop on Cryptology (NWCR), 2010, PSG College of Technology, Peelamedu,Coimbatore, September 2-4, 2010, 2012
Recent cryptanalytic attacks have exposed the vulnerabilities of some widely used cryptographic hash functions like MD5 and SHA-1. Attacks in the line of differential attacks have been used to expose the weaknesses of several other hash functions like RIPEMD, HAVAL.
arxiv  

Automated Quantum Circuit Generation for Computing Inverse Hash Functions [PDF]

open access: yesarXiv
Several cryptographic systems depend upon the computational difficulty of reversing cryptographic hash functions. Robust hash functions transform inputs to outputs in such a way that the inputs cannot be later retrieved in a reasonable amount of time even if the outputs and the function that created them are known.
arxiv  

Collision-resistant hash function based on composition of functions [PDF]

open access: yesARIMA, Vol. 14 - pp. 167-183, 2011, 2011
cryptographic hash function is a deterministic procedure that compresses an arbitrary block of numerical data and returns a fixed-size bit string. There exist many hash functions: MD5, HAVAL, SHA, ... It was reported that these hash functions are not longer secure.
arxiv  

Tightly-Secure Two-Tier Signatures on Code-Based Digital Signatures with Chameleon Hash Functions

open access: yesMathematics
In the current landscape where quantum algorithms pose a significant threat to conventional digital signature algorithms, code-based digital signature algorithms have emerged as the primary focus of ongoing research in post-quantum cryptography.
Yong Wang, Eddie Shahril Ismail
doaj   +1 more source

Improving Privacy and Trust in Federated Identity Using SAML with Hash Based Encryption Algorithm [PDF]

open access: yesarXiv, 2018
Cloud computing is an upcoming technology that has been designed for commercial needs. One of the major issues in cloud computing is the difficulty to manage federated identities and the trust between the user and the service providers. This paper focuses on how security can be provided between the user and the service provider and how the user ...
arxiv  

Security of a New Cryptographic Hash Function - Titanium [PDF]

open access: green, 2018
Abdullah Nazeeh Saleh   +1 more
openalex   +1 more source

Home - About - Disclaimer - Privacy