Results 61 to 70 of about 2,695,884 (227)
Spatiotemporal chaotic one-way Hash function construction based on coupled tent maps
A novel coupled tent maps-based spatiotemporal chaotic cryptographic Hash function was proposed.Compared with the discrete tent map,the coupled discrete tent spatiotemporal chaotic maps have longer computer-realization-period,nearly uniform distribution ...
LIU Jian-dong, FU Xiu-li
doaj +2 more sources
Cuckoo Hashing in Cryptography: Optimal Parameters, Robustness and Applications [PDF]
Cuckoo hashing is a powerful primitive that enables storing items using small space with efficient querying. At a high level, cuckoo hashing maps $n$ items into $b$ entries storing at most $\ell$ items such that each item is placed into one of $k$ randomly chosen entries. Additionally, there is an overflow stash that can store at most $s$ items.
arxiv
An SHA-3 Hardware Architecture against Failures Based on Hamming Codes and Triple Modular Redundancy
Cryptography has become one of the vital disciplines for information technology such as IoT (Internet Of Things), IIoT (Industrial Internet Of Things), I4.0 (Industry 4.0), and automotive applications.
Alan Torres-Alvarado+5 more
doaj +1 more source
Random Bit Generator Mechanism Based on Elliptic Curves and Secure Hash Function [PDF]
Pseudorandom bit generators (PRBG) can be designed to take the advantage of some hard number theoretic problems such as the discrete logarithm problem (DLP). Such type of generators will have good randomness and unpredictability properties as it is so difficult to find an easy solution to the regarding mathematical dilemma.
arxiv
ABSTRACT The proliferation of distributed energy resources (DERs) and the large‐scale electrification of transportation are driving forces behind the ongoing evolution for transforming traditionally passive consumers into prosumers (both consumers and producers) in coordinated power distribution network (PDN) and urban transportation network (UTN).
Matin Farhoumandi+3 more
wiley +1 more source
MD5 is a one-way cryptographic function used in various fields for maintaining data integrity. The application of a Hash function can provide much protection and privacy and subsequently reduce data usage.
Ammar Mohammed Ali, Alaa Kadhim Farhan
doaj +1 more source
A Novel Hardware Architecture for Enhancing the Keccak Hash Function in FPGA Devices
Hash functions are an essential mechanism in today’s world of information security. It is common practice to utilize them for storing and verifying passwords, developing pseudo-random sequences, and deriving keys for various applications, including ...
Argyrios Sideris+2 more
doaj +1 more source
A Hash of Hash Functions [PDF]
In this paper, we present a general review of hash functions in a cryptographic sense. We give special emphasis on some particular topics such as cipher block chaining message authentication code (CBC MAC) and its variants. This paper also broadens the information given in some well known surveys, by including more details on block-cipher based hash ...
arxiv
On the (Im)plausibility of Public-Key Quantum Money from Collision-Resistant Hash Functions [PDF]
Public-key quantum money is a cryptographic proposal for using highly entangled quantum states as currency that is publicly verifiable yet resistant to counterfeiting due to the laws of physics. Despite significant interest, constructing provably-secure public-key quantum money schemes based on standard cryptographic assumptions has remained an elusive
arxiv
Asymmetric cryptography and practical security
Since the appearance of public-key cryptography in Diffie-Hellman seminal paper, many schemes have been proposed, but many have been broken. Indeed, for many people, the simple fact that a cryptographic algorithm withstands cryptanalytic attacks for ...
David Pointcheval
doaj +1 more source