Results 91 to 100 of about 2,695,884 (227)
A Secure Hash Function MD-192 With Modified Message Expansion [PDF]
Cryptographic hash functions play a central role in cryptography. Hash functions were introduced in cryptology to provide message integrity and authentication. MD5, SHA1 and RIPEMD are among the most commonly used message digest algorithm. Recently proposed attacks on well known and widely used hash functions motivate a design of new stronger hash ...
arxiv
A Novel Approach to Increase Security in AODV Using RSA Asymmetric Cryptography and Hash Function [PDF]
Utkarsh Mendevell
openalex +1 more source
An Efficient Cryptographic Hash Algorithm (BSA) [PDF]
Recent cryptanalytic attacks have exposed the vulnerabilities of some widely used cryptographic hash functions like MD5 and SHA-1. Attacks in the line of differential attacks have been used to expose the weaknesses of several other hash functions like RIPEMD, HAVAL.
arxiv
Automated Quantum Circuit Generation for Computing Inverse Hash Functions [PDF]
Several cryptographic systems depend upon the computational difficulty of reversing cryptographic hash functions. Robust hash functions transform inputs to outputs in such a way that the inputs cannot be later retrieved in a reasonable amount of time even if the outputs and the function that created them are known.
arxiv
Collision-resistant hash function based on composition of functions [PDF]
cryptographic hash function is a deterministic procedure that compresses an arbitrary block of numerical data and returns a fixed-size bit string. There exist many hash functions: MD5, HAVAL, SHA, ... It was reported that these hash functions are not longer secure.
arxiv
Basic Cryptographic Concepts and Open Problems in Hash Function Security
Johnna Smith, Donald Mills
openalex +2 more sources
Tightly-Secure Two-Tier Signatures on Code-Based Digital Signatures with Chameleon Hash Functions
In the current landscape where quantum algorithms pose a significant threat to conventional digital signature algorithms, code-based digital signature algorithms have emerged as the primary focus of ongoing research in post-quantum cryptography.
Yong Wang, Eddie Shahril Ismail
doaj +1 more source
Improving Privacy and Trust in Federated Identity Using SAML with Hash Based Encryption Algorithm [PDF]
Cloud computing is an upcoming technology that has been designed for commercial needs. One of the major issues in cloud computing is the difficulty to manage federated identities and the trust between the user and the service providers. This paper focuses on how security can be provided between the user and the service provider and how the user ...
arxiv
Security of a New Cryptographic Hash Function - Titanium [PDF]
Abdullah Nazeeh Saleh+1 more
openalex +1 more source