نتایج جستجو برای: cayley hash function
تعداد نتایج: 1221998 فیلتر نتایج به سال:
In the recent decade, global community has been one of world's most prominent targets terrorist strikes. There is still study being done and improved efficiency procedures needed in this sector, however security forces law enforcement agencies are creating launching high weaponry to secure their territories. a huge necessity include greater level protection into military vehicles wake several a...
The security challenges posed by RFID-tag deployments are wellknown. In response there is a rich literature on new cryptographic protocols and an on-tag hash function is often assumed by protocol designers. Yet cheap tags pose severe implementation challenges and it is far from clear that a suitable hash function even exists. In this paper we consider the options available, including constructi...
Chameleon signatures are based on well established hash-and-sign paradigm, where a chameleon hash function is used to compute the cryptographic message digest, and becomes an important building block. The chameleon hash function is a trapdoor one-way hash function with some special properties, and plays an important role in constructing chameleon signature. In the paper, we propose a new chamel...
A hash function is a function that takes a set of characters called plaintext and converts it to a form that is very difficult to revert back to the original set of characters. Hash functions play very important role in computer security, computer vision, bloom filters and search algorithms. The current cryptographic hash functions such as Hashed Message Authentication Code (HMAC), Message Dige...
Recent VLSI hash function designs allow incorporating features such as more complex input expansion schedules, more rounds and bigger states into these functions. As a result, these hash functions are slower and bulkier when compared with previous ones such as MD4, MD5, SHA-1, RIPEMD, etc. An architecture and VLSI implementation of a new hash function called RadioGatún, that achieves high-speed...
HAS-V is a cryptographic hash function which processes 1024-bit message blocks and produces a hash value of variable length. The design of the hash function is based on design principles of the MD4 family. Recently, weaknesses have been shown in members of this family. Therefore, the analysis of the HAS-V hash function is of great interest. To the best of our knowledge this is the first article...
Some applications use data formats (for example STL file format), where a set of triangles is used to represent a surface of an object and it is necessary to reconstruct the regular triangular mesh from such a data format for many applications. It is a lengthy process for large data sets as the time complexity of this process is O(N) or O(N lgN), where N is a number of triangles. Hash data stru...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید