نتایج جستجو برای: fischerella sp sha

تعداد نتایج: 122273  

Journal: :IACR Cryptology ePrint Archive 2004
Philip Hawkes Michael Paddon Gregory G. Rose

The Secure Hash Standard (SHS) [3] includes hashing algorithms denoted SHA-n, n ∈ 224, 256, 384, 512 for producing message digests of length n. These algorithms are based on a common design, sometimes known as SHA-2, that consists of a message schedule and a register. The most successful attacks on the SHA algorithms are Chabaud-Joux differential collisions [1, 2, 4, 5, 7], which are based on f...

2013
Mohammad A. AlAhmad Imad Fakhri Alshaikhli

Cryptographic hash function is a function that takes an arbitrary length as an input and produces a fixed size of an output. The viability of using cryptographic hash function is to verify data integrity and sender identity or source of information. This paper provides a detailed overview of cryptographic hash functions. It includes the properties, classification, constructions, attacks, applic...

Journal: :IACR Cryptology ePrint Archive 2017
Marc Stevens Daniel Shumow

Counter-cryptanalysis, the concept of using cryptanalytic techniques to detect cryptanalytic attacks, was first introduced by Stevens at CRYPTO 2013 [22] with a hash collision detection algorithm. That is, an algorithm that detects whether a given single message is part of a colliding message pair constructed using a cryptanalytic collision attack on MD5 or SHA-1. The concept’s utility was prov...

2005
Lars R. Knudsen

1 This paper presents a new hash function design, which is different from the popular designs of the MD4-family. Seen in the light of recent attacks on MD4, MD5, SHA-0, SHA-1, and on RIPEMD, there is a need to consider other hash function design strategies. The paper presents also a concrete hash function design named SMASH. One version has a hash code of 256 bits and appears to be at least as ...

2006
Deukjo Hong Donghoon Chang Jaechul Sung Sangjin Lee Seokhie Hong Jaesang Lee Dukjae Moon Sungtaek Chee

This paper describes a new software-efficient 256-bit hash function, FORK-256. Recently proposed attacks on MD5 and SHA-1 motivate a new hash function design. It is designed not only to have higher security but also to be faster than SHA-256. The performance of the new hash function is at least 30% better than that of SHA-256 in software. And it is secure against any known cryptographic attacks...

Journal: :RFC 2011
Kevin M. Igoe

This document describes the architecture of a Suite B compliant implementation of the Secure Shell Transport Layer Protocol and the Secure Shell Authentication Protocol. Suite B Secure Shell makes use of the elliptic curve Diffie-Hellman (ECDH) key agreement, the elliptic curve digital signature algorithm (ECDSA), the Advanced Encryption Standard running in Galois/Counter Mode (AES-GCM), two me...

Journal: :Journal of architecture,planning and environmental engineering 2023

The magazine “Design” was published from September 1927 to October 1935 by Sousei-sha in Osaka, led Kouichi Emura. It introduced some architectural organizations such as International Architectural Association of Japan, Souu-sha, Teppi-sha, and Rokka Crafts Association. works articles were range eclecticism modernism, various specialists architecture, design, landscaping, furniture, etc.. edito...

Journal: :Energies 2022

This study evaluates the energy efficiency of pressure shock damping in a hydraulic lifting and leveling (HLL) module mobile robotic bricklaying system (RBS). The HLL includes servohydraulic actuator (SHA) damper (HSD). proposed adjustable HSD consists accumulator circuit (HAC) proportional valve. frequency characteristics impedance indices were used to evaluate effectiveness damping. dynamic r...

Journal: :Indonesian Journal of Electrical Engineering and Computer Science 2018

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید