نتایج جستجو برای: sha 3

تعداد نتایج: 1812667  

2016
Sourabh Kulkarni

Implementing hash functions to run on multi-core computers will reduce its running time. We aim to implement Cayley, SHA-256 and SHA-512 hash functions to run on multicore computers and compare their performances. Cayley hash compresses the input message by hashing one bit at a time using composition of linear equations. SHA-256 and SHA-512 work on message blocks and produce fixed length digest...

Journal: :International Journal on Smart Sensing and Intelligent Systems 2020

2011
Daniel J. Bernstein Tanja Lange Christiane Peters Peter Schwabe

The FSB (fast syndrome-based) hash function was submitted to the SHA-3 competition by Augot, Finiasz, Gaborit, Manuel, and Sendrier in 2008, after preliminary designs proposed in 2003, 2005, and 2007. Many FSB parameter choices were broken by Coron and Joux in 2004, Saarinen in 2007, and Fouque and Leurent in 2008, but the basic FSB idea appears to be secure, and the FSB submission remains unbr...

Journal: :Infection and immunity 1987
J E Ciardi G F McCray P E Kolenbrander A Lau

Cell-to-cell interaction (coaggregation) between Propionibacterium acnes PK93 and Streptococcus sanguis DL1 was measured on saliva-coated hydroxyapatite beads (SHA) at bacterial concentrations between 1.3 X 10(6) and 6.7 X 10(8) cells per ml. Four hundredfold more DL1 than PK93 cells adhered to the saliva-coated beads, and the adherence of S. sanguis was proportional to cell input. SHA precoate...

Journal: :IJSSE 2013
Pal-Stefan Murvay Bogdan Groza

Embedded devices are ubiquitously involved in a large variety of security applications which heavily rely on the computation of hash functions. Roughly, two alternatives for speeding up computations co-exist in these resource constrained devices: parallel processing and hardware acceleration. Needles to say, multi-core devices are clearly the next step in embedded systems due to clear technolog...

Journal: :J. Inf. Sci. Eng. 2013
Chu-Hsing Lin Chen-Yu Lee Krishna M. Kavi Deng-Jyi Chen Yi-Shiung Yeh

One-way hash functions play an important role in modern cryptography. Matusiewicz et al. proved that the message scheduling is essential for the security of SHA256 by showing that it is possible to find collisions with complexity 2 hash operations for a variant without it. In this article, we first proposed the conjecture that message scheduling of SHA algorithm has higher security complexity (...

2010
Joppe W. Bos Deian Stefan

The NIST hash function competition to design a new cryptographic hash standard ‘SHA-3’ is currently one of the hot topics in cryptologic research, its outcome heavily depends on the public evaluation of the remaining 14 candidates. There have been several cryptanalytic efforts to evaluate the security of these hash functions. Concurrently, invaluable benchmarking efforts have been made to measu...

Journal: :IACR Cryptology ePrint Archive 2008
Vlastimil Klíma

In this paper we don't examine security of Turbo SHA-2 completely; we only show new collision attacks on it, with smaller complexity than it was considered by Turbo SHA-2 authors. In [1] they consider Turbo SHA-224/256r and Turbo SHA-384/512-r with variable number of rounds r from 1 to 8. The authors of [1] show collision attack on Turbo SHA-256-1 with one round which has the complexity of 2. F...

2010
Eli Biham Orr Dunkelman

In this paper we present the current state of the SHA-3 submission SHAvite-3. We address the performance of SHAvite-3, and gather some implementation data, available at the moment. We then discuss some of the issues and results concerning the security of SHAvite-3. While we prove that the SHAvite-3 family offers secure hash functions, we also suggest a slightly tweaked version of SHAvite-3512 t...

2009
Ryad Benadjila Olivier Billet Shay Gueron Matthew J. B. Robshaw

The search for SHA-3 is now well-underway and the 51 accepted submissions reflect a wide variety of design approaches. A significant number are built around Rijndael/AES-based operations and, in some cases, the AES round function itself. Many of the design teams have pointed to the forthcoming Intel AES instructions set, to appear on Westmere chips during 2010, when making a variety of performa...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید