Results 151 to 160 of about 34,780 (224)
Novel Non-cryptographic Hash Functions for Networking and Security Applications on FPGA
This paper proposes the design and FPGA implementation of five novel non-cryptographic hash functions, that are suitable to be used in networking and security applications that require fast lookup and/or counting architectures. Our approach is inspired by the design of the existing non-cryptographic hash function Xoodoo-NC, which is constructed through
Claesen, T.+3 more
semanticscholar +6 more sources
Performance and Security Tradeoffs in Cryptographic Hash Functions
A cryptographic hash function is an important component used in many applications, such as blockchain, authentication, data integrity, and digital signature. With the rapid increase in usage of mobile devices, more attention goes towards the tradeoffs between performance and security of cryptographic hash functions on mobile devices due to their ...
Omar Mohammed Bawazeer+1 more
semanticscholar +4 more sources
Different Cryptographic Hash Functions for Security in the Blockchain
In day-to-day life, everyone is concerned about their security and privacy, and their concern becomes more when it comes to transactions. The technology behind blockchain is quite young.
Dhramandra Sharma, Monika Saxena
semanticscholar +3 more sources
Recent developments in cryptographic hash functions: Security implications and future directions
One of the most important classes of cryptographic algorithms in current use is the class of cryptographic hash functions. Hash functions are ubiquitous in today's IT systems and have a wide range of applications in security protocols and schemes, such as providing software integrity, digital signatures, message authentication and password protection ...
Carlos Cid
semanticscholar +4 more sources
Cryptographic hash functions can map data of arbitrary size to data of fixed size (hash values), which can be used in a wide range of multimedia applications for communication security, such as integrity protection, message authentication and digital signature.
Yantao Li, Guangfu Ge
semanticscholar +4 more sources
Cryptographic security evaluation of MD4 hash function
Cryptography is the only powerful tool for achieving high levels of information security in a computer networks environment. The ISO have proposed five security service groups including, confidentiality, authentication, data integrity, non-repudiation, and access control.
R.H. Seireg+2 more
openaire +3 more sources
Low-Complexity Cryptographic Hash Functions [PDF]
Cryptographic hash functions are efficiently computable functions that shrink a long input into a shorter output while achieving some of the useful security properties of a random function.
Benny Applebaum+4 more
semanticscholar +4 more sources
Weak Security Notions of Cryptographic Unkeyed Hash Functions and Their Amplifiability
Cryptographic unkeyed hash functions should satisfy preimage resistance, second-preimage resistance and collision resistance. In this article, weak second-preimage resistance and weak collision resistance are defined following the definition of weak one-wayness. Preimage resistance is one-wayness of cryptographic hash functions.
Shoichi Hirose
openaire +3 more sources
Cryptographic Hash Functions and Some Applications to Information Security
We explore hashing with matrices over \(\mathrm {SL}_2({\mathbb F}_p)\), outlining known results of Tillich and Zemor. We then summarize the bounds on the girth of the Cayley graph of the subgroup of \(\mathrm {SL}_2({\mathbb F}_p)\) for specific generators A, B, work done by the author, Shpilrain, and Vdovina.
Lisa Bromberg
openaire +3 more sources
A Technique for Boosting the Security of Cryptographic Systems with One-Way Hash Functions
In this paper, we show a practical solution to the problems where one-wayness of hash functions does not guarantee cryptographic systems to be secure enough. We strengthen the notion of one-wayness of hash functions and construct strongly one-way hash functions from any one-way hash function or any one-way function.
Takeshi Koshiba
openaire +3 more sources