Results 151 to 160 of about 34,780 (224)

Novel Non-cryptographic Hash Functions for Networking and Security Applications on FPGA

open access: closed2021 24th Euromicro Conference on Digital System Design (DSD), 2021
This paper proposes the design and FPGA implementation of five novel non-cryptographic hash functions, that are suitable to be used in networking and security applications that require fast lookup and/or counting architectures. Our approach is inspired by the design of the existing non-cryptographic hash function Xoodoo-NC, which is constructed through
Claesen, T.   +3 more
semanticscholar   +6 more sources

Performance and Security Tradeoffs in Cryptographic Hash Functions

open access: closedInternational Journal of Interdisciplinary Telecommunications and Networking, 2020
A cryptographic hash function is an important component used in many applications, such as blockchain, authentication, data integrity, and digital signature. With the rapid increase in usage of mobile devices, more attention goes towards the tradeoffs between performance and security of cryptographic hash functions on mobile devices due to their ...
Omar Mohammed Bawazeer   +1 more
semanticscholar   +4 more sources

Different Cryptographic Hash Functions for Security in the Blockchain

open access: closed2023 International Conference on Data Science and Network Security (ICDSNS), 2023
In day-to-day life, everyone is concerned about their security and privacy, and their concern becomes more when it comes to transactions. The technology behind blockchain is quite young.
Dhramandra Sharma, Monika Saxena
semanticscholar   +3 more sources

Recent developments in cryptographic hash functions: Security implications and future directions

open access: closedInformation Security Technical Report, 2006
One of the most important classes of cryptographic algorithms in current use is the class of cryptographic hash functions. Hash functions are ubiquitous in today's IT systems and have a wide range of applications in security protocols and schemes, such as providing software integrity, digital signatures, message authentication and password protection ...
Carlos Cid
semanticscholar   +4 more sources

Cryptographic and parallel hash function based on cross coupled map lattices suitable for multimedia communication security

open access: closedMultimedia Tools and Applications, 2019
Cryptographic hash functions can map data of arbitrary size to data of fixed size (hash values), which can be used in a wide range of multimedia applications for communication security, such as integrity protection, message authentication and digital signature.
Yantao Li, Guangfu Ge
semanticscholar   +4 more sources

Cryptographic security evaluation of MD4 hash function

open access: closedThirteenth National Radio Science Conference. NRSC '96, 2002
Cryptography is the only powerful tool for achieving high levels of information security in a computer networks environment. The ISO have proposed five security service groups including, confidentiality, authentication, data integrity, non-repudiation, and access control.
R.H. Seireg   +2 more
openaire   +3 more sources

Low-Complexity Cryptographic Hash Functions [PDF]

open access: yesInformation Technology Convergence and Services, 2017
Cryptographic hash functions are efficiently computable functions that shrink a long input into a shorter output while achieving some of the useful security properties of a random function.
Benny Applebaum   +4 more
semanticscholar   +4 more sources

Weak Security Notions of Cryptographic Unkeyed Hash Functions and Their Amplifiability

open access: closedIEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2005
Cryptographic unkeyed hash functions should satisfy preimage resistance, second-preimage resistance and collision resistance. In this article, weak second-preimage resistance and weak collision resistance are defined following the definition of weak one-wayness. Preimage resistance is one-wayness of cryptographic hash functions.
Shoichi Hirose
openaire   +3 more sources

Cryptographic Hash Functions and Some Applications to Information Security

open access: closed, 2017
We explore hashing with matrices over \(\mathrm {SL}_2({\mathbb F}_p)\), outlining known results of Tillich and Zemor. We then summarize the bounds on the girth of the Cayley graph of the subgroup of \(\mathrm {SL}_2({\mathbb F}_p)\) for specific generators A, B, work done by the author, Shpilrain, and Vdovina.
Lisa Bromberg
openaire   +3 more sources

A Technique for Boosting the Security of Cryptographic Systems with One-Way Hash Functions

open access: closed, 2000
In this paper, we show a practical solution to the problems where one-wayness of hash functions does not guarantee cryptographic systems to be secure enough. We strengthen the notion of one-wayness of hash functions and construct strongly one-way hash functions from any one-way hash function or any one-way function.
Takeshi Koshiba
openaire   +3 more sources

Home - About - Disclaimer - Privacy