نتایج جستجو برای: cayley hash function

تعداد نتایج: 1221998  

Journal: :DEStech Transactions on Engineering and Technology Research 2019

Journal: :International Journal on Recent and Innovation Trends in Computing and Communication 2019

Journal: :International Journal of Computer Network and Information Security 2012

Journal: :Wasit journal of computer and mathematics science 2022

In the recent decade, global community has been one of world's most prominent targets terrorist strikes. There is still study being done and improved efficiency procedures needed in this sector, however security forces law enforcement agencies are creating launching high weaponry to secure their territories. a huge necessity include greater level protection into military vehicles wake several a...

2008
Andrey Bogdanov Gregor Leander Christof Paar Axel Poschmann Matthew J. B. Robshaw Yannick Seurin

The security challenges posed by RFID-tag deployments are wellknown. In response there is a rich literature on new cryptographic protocols and an on-tag hash function is often assumed by protocol designers. Yet cheap tags pose severe implementation challenges and it is far from clear that a suitable hash function even exists. In this paper we consider the options available, including constructi...

2009
Jianhong Zhang Hua Chen Qin Geng

Chameleon signatures are based on well established hash-and-sign paradigm, where a chameleon hash function is used to compute the cryptographic message digest, and becomes an important building block. The chameleon hash function is a trapdoor one-way hash function with some special properties, and plays an important role in constructing chameleon signature. In the paper, we propose a new chamel...

2016
Samuel King Opoku

A hash function is a function that takes a set of characters called plaintext and converts it to a form that is very difficult to revert back to the original set of characters. Hash functions play very important role in computer security, computer vision, bloom filters and search algorithms. The current cryptographic hash functions such as Hashed Message Authentication Code (HMAC), Message Dige...

2007
Paris Kitsos Bhanu Prasad

Recent VLSI hash function designs allow incorporating features such as more complex input expansion schedules, more rounds and bigger states into these functions. As a result, these hash functions are slower and bulkier when compared with previous ones such as MD4, MD5, SHA-1, RIPEMD, etc. An architecture and VLSI implementation of a new hash function called RadioGatún, that achieves high-speed...

2007
Florian Mendel Vincent Rijmen

HAS-V is a cryptographic hash function which processes 1024-bit message blocks and produces a hash value of variable length. The design of the hash function is based on design principles of the MD4 family. Recently, weaknesses have been shown in members of this family. Therefore, the analysis of the HAS-V hash function is of great interest. To the best of our knowledge this is the first article...

2009
Václav Skala Jan Hrádek Martin Kuchař

Some applications use data formats (for example STL file format), where a set of triangles is used to represent a surface of an object and it is necessary to reconstruct the regular triangular mesh from such a data format for many applications. It is a lengthy process for large data sets as the time complexity of this process is O(N) or O(N lgN), where N is a number of triangles. Hash data stru...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید