Remarks on Gödel’s code as a hash function
نویسندگان
چکیده
منابع مشابه
An Improved Hash Function Based on the Tillich-Zémor Hash Function
Using the idea behind the Tillich-Zémor hash function, we propose a new hash function. Our hash function is parallelizable and its collision resistance is implied by a hardness assumption on a mathematical problem. Also, it is secure against the known attacks. It is the most secure variant of the Tillich-Zémor hash function until now.
متن کاملImprovement on a Trapdoor Hash Function
By appending some bits to the original signature, a trapdoor hash function converts any signature scheme into secure signature scheme with very efficient online computation. Many of them have been proposed. However, all of them require performing a modular reduction during the online phase. The paper presents a trapdoor hash function to get rid of the modular reduction in online computation.
متن کاملA Lightweight Hash Function
In this paper, to match a lightweight digital signing scheme of which the length of modulus is between 80 and 160 bits, a lightweight hash function called JUNA is proposed. It is based on the intractabilities MPP and ASPP, and regards a short message or a message digest as an input which is treated as only one block. The JUNA hash contains two algorithms: an initialization algorithm and a compr...
متن کاملRemarks on a generalized beta function
We show that a certain generalized beta function B(x; y; b) which reduces to Euler’s beta functions B(x; y) when its variable b vanishes and preserves symmetry in its parameters may be represented in terms of a nite number of well known higher transcendental functions except (possibly) in the case when one of its parameters is an integer and the other is not. In the latter case B(x; y; b) may b...
متن کاملA Hash Function System Based on Quadratic Function
A hash function is a function that takes a set of characters called plaintext and converts it to a form that is very difficult to revert back to the original set of characters. Hash functions play very important role in computer security, computer vision, bloom filters and search algorithms. The current cryptographic hash functions such as Hashed Message Authentication Code (HMAC), Message Dige...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Tatra Mountains Mathematical Publications
سال: 2010
ISSN: 1210-3195
DOI: 10.2478/v10127-010-0031-8