Results 21 to 30 of about 46,179 (288)

Cryptanalysis of SHA-0 and Reduced SHA-1 [PDF]

open access: yesJournal of Cryptology, 2014
The item is an extended paper (50 pages) which continues and completes the results from [\textit{E. Biham} and \textit{R. Chen}, Crypto 2004, Lect. Notes Comput. Sci. 3152, 290--305 (2004; Zbl 1104.94307), ``New results on SHA-1 and SHA-0'', in Crypto 2004, Rump Session] and E. Biham, R. Chen, A. Joux, P. Carribault, C. Lemmuer and W. Jalby, [\textit{E.
Biham, Eli, Chen, Rafi, Joux, Antoine
openaire   +4 more sources

Search framework for neutral bits and boomerangs in SHA‐1 collision attacks

open access: yesIET Information Security, 2023
Neutral bits and boomerangs are key techniques for accelerating collision search in SHA‐1 attacks. The current acceleration techniques for SHA‐1 near‐collision attacks are reviewed and a generic search framework for neutral bits and boomerangs is ...
Degang Li, Yang Yang, Guang Zeng
doaj   +1 more source

Modified SHA-1 Algorithm

open access: yesIndonesian Journal of Electrical Engineering and Computer Science, 2018
Hashes are used to check the integrity of data. This paper modified SHA-1 by incorporating mixing method in every round for better diffusion. The modification increased the hash output to 192-bits. Increasing the output increases the strength because breaking the hash takes longer.
Rogel Ladia Quilala   +2 more
openaire   +2 more sources

Source File Set Search for Clone-and-Own Reuse Analysis [PDF]

open access: yes, 2017
Clone-and-own approach is a natural way of source code reuse for software developers. To assess how known bugs and security vulnerabilities of a cloned component affect an application, developers and security analysts need to identify an original version
Inoue, Katsuro   +3 more
core   +2 more sources

Silica Xerogel Doped with Iron(III) as Sensor Material for Salicylhydroxamic Acid Determination in Urine

open access: yesGels, 2021
Salicylhydroxamic acid (SHA) is used as antimicrobic medicine and its concentration has to be monitored in urine. For the first time, silica xerogels doped with iron(III) have been proposed as sensor materials for SHA determination in biological samples.
Maria A. Morosanova   +2 more
doaj   +1 more source

SHA-1 is a Shambles

open access: yes, 2020
The SHA-1 hash function was designed in 1995 and has been widely used during two decades. A theoretical collision attack was first proposed in 2004 [29], but due to its high complexity it was only implemented in practice in 2017, using a large GPU cluster [23].
Leurent, Gaëtan, Peyrin, Thomas
openaire   +2 more sources

SHA-1 and the Strict Avalanche Criterion [PDF]

open access: yes2016 Information Security for South Africa (ISSA), 2016
The Strict Avalanche Criterion (SAC) is a measure of both confusion and diffusion, which are key properties of a cryptographic hash function. This work provides a working definition of the SAC, describes an experimental methodology that can be used to statistically evaluate whether a cryptographic hash meets the SAC, and uses this to investigate the ...
Motara, Yusuf, M, Irwin, Barry V W
openaire   +2 more sources

An Experiment in Interoperable Cryptographic Protocol Implementation Using Automatic Code Generation [PDF]

open access: yes, 2007
Spi2Java is a tool that enables semi-automatic generation of cryptographic protocol implementations, starting from verified formal models. This paper shows how the last version of spi2Java has been enhanced in order to enable interoperability of the ...
Pironti, Alfredo, Sisto, Riccardo
core   +1 more source

GigaByte: Publishing at the Speed of Research

open access: yesGigaByte, 2020
Current practices in scientific publishing are unsuitable for rapidly changing fields and for presenting updatable data sets and software tools.
Scott C. Edmunds , Laurie Goodman
doaj   +1 more source

Biomimetic ion substituted and Co-substituted hydroxyapatite nanoparticle synthesis using Serratia Marcescens

open access: yesScientific Reports, 2023
Biomimicry is becoming deep-rooted as part of bioceramics owing to its numerous functional advantages. Naturally occurring hydroxyapatite (HA) apart from primary nano structures are also characterised by various ionic substitutions.
Mareeswari Paramasivan   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy