نتایج جستجو برای: cayley hash function

تعداد نتایج: 1221998  

2006
Florian Mendel Norbert Pramstaller Christian Rechberger

In this article, we present an improved collision attack on the hash function proposed by Shin et al. at PKC’98. The attack has a complexity of about 2 hash computations, while the previous attack of Chang et al. presented at SAC 2002 has a complexity of about 2 hash computations. In the analysis of the hash function we combined existing approaches with recent results in cryptanalysis of hash f...

2008
Sebastiaan Indesteege Bart Preneel

RC4-Hash is a variable digest length cryptographic hash function based on the design of the RC4 stream cipher. In this paper, we show that RC4-Hash is not collision resistant. Collisions for any digest length can be found with an expected effort of less than 2 compression function evaluations. This is extended to multicollisions for RC4-Hash. Finding a set of 2 colliding messages has an expecte...

2005
Lars R. Knudsen

1 This paper presents a new hash function design, which is different from the popular designs of the MD4-family. Seen in the light of recent attacks on MD4, MD5, SHA-0, SHA-1, and on RIPEMD, there is a need to consider other hash function design strategies. The paper presents also a concrete hash function design named SMASH. One version has a hash code of 256 bits and appears to be at least as ...

2011
Meera Sitharam Menghan Wang Heping Gao

Describing configuration spaces of 1-degree-of-freedom (1-dof) linkages in 2D is a difficult problem with a long history. We use the Cayley configuration space, a set of intervals of possible distance-values for an independent non-edge. We study the following complexity measures (associated with the linkage’s underlying graph): (a) Cayley size, i.e., the number of intervals, (b) Cayley computat...

Journal: :International Journal of Bifurcation and Chaos 2020

Journal: :Revue Africaine de la Recherche en Informatique et Mathématiques Appliquées 2011

Journal: :International Journal of Electronics and Telecommunications 2023

In this paper, we propose a novel hash function based on irregularly decimated chaotic map. The called SHAH is two Tinkerbell maps filtered with irregular decimation rule. Exact study has been provided the scheme using distribution analysis, sensitivity static analysis of diffusion and confusion, collision analysis. experimental data show that satisfied admirable level security.

2015
Zhijie Shi Bing Wang

where M is the input message and h is the hash generated by the hash algorithm H . Normally, the size of the hash h is fixed by the algorithm. For a cryptographic hash function, the hash length should be large enough to prevent an attack from finding two or more messages that generate the same hash. Currently, the most commonly used hash algorithms are MD5 [1] and SHA-2 [2]. In general, the cry...

Journal: :Journal of Physics: Conference Series 2017

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید