Remarks on Gödel’s code as a hash function

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Improved Hash Function Based on the Tillich-Zémor Hash Function

Using the idea behind the Tillich-Zémor hash function, we propose a new hash function. Our hash function is parallelizable and its collision resistance is implied by a hardness assumption on a mathematical problem. Also, it is secure against the known attacks. It is the most secure variant of the Tillich-Zémor hash function until now.

متن کامل

Improvement on a Trapdoor Hash Function

By appending some bits to the original signature, a trapdoor hash function converts any signature scheme into secure signature scheme with very efficient online computation. Many of them have been proposed. However, all of them require performing a modular reduction during the online phase. The paper presents a trapdoor hash function to get rid of the modular reduction in online computation.

متن کامل

A Lightweight Hash Function

In this paper, to match a lightweight digital signing scheme of which the length of modulus is between 80 and 160 bits, a lightweight hash function called JUNA is proposed. It is based on the intractabilities MPP and ASPP, and regards a short message or a message digest as an input which is treated as only one block. The JUNA hash contains two algorithms: an initialization algorithm and a compr...

متن کامل

Remarks on a generalized beta function

We show that a certain generalized beta function B(x; y; b) which reduces to Euler’s beta functions B(x; y) when its variable b vanishes and preserves symmetry in its parameters may be represented in terms of a nite number of well known higher transcendental functions except (possibly) in the case when one of its parameters is an integer and the other is not. In the latter case B(x; y; b) may b...

متن کامل

A Hash Function System Based on Quadratic Function

A hash function is a function that takes a set of characters called plaintext and converts it to a form that is very difficult to revert back to the original set of characters. Hash functions play very important role in computer security, computer vision, bloom filters and search algorithms. The current cryptographic hash functions such as Hashed Message Authentication Code (HMAC), Message Dige...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Tatra Mountains Mathematical Publications

سال: 2010

ISSN: 1210-3195

DOI: 10.2478/v10127-010-0031-8