Results 21 to 30 of about 46,179 (288)
Cryptanalysis of SHA-0 and Reduced SHA-1 [PDF]
The item is an extended paper (50 pages) which continues and completes the results from [\textit{E. Biham} and \textit{R. Chen}, Crypto 2004, Lect. Notes Comput. Sci. 3152, 290--305 (2004; Zbl 1104.94307), ``New results on SHA-1 and SHA-0'', in Crypto 2004, Rump Session] and E. Biham, R. Chen, A. Joux, P. Carribault, C. Lemmuer and W. Jalby, [\textit{E.
Biham, Eli, Chen, Rafi, Joux, Antoine
openaire +4 more sources
Search framework for neutral bits and boomerangs in SHA‐1 collision attacks
Neutral bits and boomerangs are key techniques for accelerating collision search in SHA‐1 attacks. The current acceleration techniques for SHA‐1 near‐collision attacks are reviewed and a generic search framework for neutral bits and boomerangs is ...
Degang Li, Yang Yang, Guang Zeng
doaj +1 more source
Hashes are used to check the integrity of data. This paper modified SHA-1 by incorporating mixing method in every round for better diffusion. The modification increased the hash output to 192-bits. Increasing the output increases the strength because breaking the hash takes longer.
Rogel Ladia Quilala +2 more
openaire +2 more sources
Source File Set Search for Clone-and-Own Reuse Analysis [PDF]
Clone-and-own approach is a natural way of source code reuse for software developers. To assess how known bugs and security vulnerabilities of a cloned component affect an application, developers and security analysts need to identify an original version
Inoue, Katsuro +3 more
core +2 more sources
Salicylhydroxamic acid (SHA) is used as antimicrobic medicine and its concentration has to be monitored in urine. For the first time, silica xerogels doped with iron(III) have been proposed as sensor materials for SHA determination in biological samples.
Maria A. Morosanova +2 more
doaj +1 more source
The SHA-1 hash function was designed in 1995 and has been widely used during two decades. A theoretical collision attack was first proposed in 2004 [29], but due to its high complexity it was only implemented in practice in 2017, using a large GPU cluster [23].
Leurent, Gaëtan, Peyrin, Thomas
openaire +2 more sources
SHA-1 and the Strict Avalanche Criterion [PDF]
The Strict Avalanche Criterion (SAC) is a measure of both confusion and diffusion, which are key properties of a cryptographic hash function. This work provides a working definition of the SAC, describes an experimental methodology that can be used to statistically evaluate whether a cryptographic hash meets the SAC, and uses this to investigate the ...
Motara, Yusuf, M, Irwin, Barry V W
openaire +2 more sources
An Experiment in Interoperable Cryptographic Protocol Implementation Using Automatic Code Generation [PDF]
Spi2Java is a tool that enables semi-automatic generation of cryptographic protocol implementations, starting from verified formal models. This paper shows how the last version of spi2Java has been enhanced in order to enable interoperability of the ...
Pironti, Alfredo, Sisto, Riccardo
core +1 more source
GigaByte: Publishing at the Speed of Research
Current practices in scientific publishing are unsuitable for rapidly changing fields and for presenting updatable data sets and software tools.
Scott C. Edmunds , Laurie Goodman
doaj +1 more source
Biomimicry is becoming deep-rooted as part of bioceramics owing to its numerous functional advantages. Naturally occurring hydroxyapatite (HA) apart from primary nano structures are also characterised by various ionic substitutions.
Mareeswari Paramasivan +4 more
doaj +1 more source

