نتایج جستجو برای: the tillich zemor hash function

تعداد نتایج: 16181744  

Journal: :Indonesian Journal of Electrical Engineering and Informatics 2022

The research of the strength a hashed message is great importance in modern authentication systems. hashing process inextricably linked with password system, since passwords are usually stored system not clear text, but as hashes. SHA-256 hash function was chosen to model attack rainbow tables. An algorithm for constructing table Java language proposed. conditions under which use tables will be...

2011
B. Denton R. Adhami

This paper discusses modern hash function construction using the NIST SHA-3 competition as a survey of modern hash function construction properties. Three primary hash function designs are identified based on the designs of SHA-3 candidates submitted as part of the NIST SHA-3 competition. These designs are Widepipe, Sponge, and HAsh Iterated FrAmework (HAIFA). Keywordscryptography; hashing; has...

Journal: :Journal of Physics: Conference Series 2017

Journal: :Journal of Computer Science and Technology 2007

Journal: :IACR Cryptology ePrint Archive 2012
Anupam Pattanayak

A hash function maps a variable length input into a fixed length output. The hash functions that are used in the information security related applications are referred as cryptographic hash functions. Hash functions are being used as building blocks of many complex cryptographic mechanisms and protocols. Construction of a hash function consists of two components. First component is a compressio...

2008
Florian Mendel Norbert Pramstaller Christian Rechberger Marcin Kontak Janusz Szmidt

In this article, we analyze the security of the GOST hash function. The GOST hash function, defined in the Russian standard GOST 34.11-94, is an iterated hash function producing a 256-bit hash value. As opposed to most commonly used hash functions such as MD5 and SHA-1, the GOST hash function defines, in addition to the common iterative structure, a checksum computed over all input message bloc...

Journal: :IACR Cryptology ePrint Archive 2013
Bingke Ma Bao Li Ronglin Hao Hongjun Wu

The Even-Mansour structure and the chopMD mode are two widely-used strategies in hash function designs. They are adopted by many hash functions including two SHA-3 finalists, the JH hash function and the Grøstl hash function. The Even-Mansour structure combining the chopMD mode is supposed to enhance the security of hash functions against collision and preimage attacks, while our results show t...

2014
Sheetal Deshmukh Apeksha Sakhare

SHA-3 (Secure hash algorithm-3), originally known as Keccak is a cryptographic hash function selected as the winner of the NIST hash function competition. Hash functions have many applications in cryptography mainly in digital signatures and message authentication codes and in network security. Implementation of the main building block (compression function) for five different SHA-3 candidates ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید