نتایج جستجو برای: cayley hash function
تعداد نتایج: 1221998 فیلتر نتایج به سال:
SHA-3 (Secure hash algorithm-3), originally known as Keccak is a cryptographic hash function selected as the winner of the NIST hash function competition. Hash functions have many applications in cryptography mainly in digital signatures and message authentication codes and in network security. Implementation of the main building block (compression function) for five different SHA-3 candidates ...
GOST-R is a Russian Standard Cryptographic Hash function which was first introduced in 1994 by Russian Federal for information processing, information security and digital signature. In 2012, it was updated to GOSTR 34.11-2012 and replaced older one for all its applications from January 2013. GOST-R is based on modified Merkle-Damg̊ard construction. Here, we present a modified version of GOST-R ...
1 Known designs Let n be a natural number and M denotes the message represented by n-bit In case the message length is not a multiple of n, it should be padded somehow. We do not specify how at this point. Most of the known hash functions are based on the Merkle-Damg ˙ ard construction. First, a compression function f (h, m) is determined, where m is an n-bit input and another input h is of the...
Tischhauser for many interesting discussions concerning the design of Lane and its predecessors, and for their continued effort on the cryptanalysis of both older and the final version of Lane. Their findings, comments and suggestions for improvements were invaluable in the design process. I extend my gratitude to Antoon Bosselaers, Emilia Käsper, Miroslav Kneževi´c, Nicky Mouha and Vesselin Ve...
We describe Fugue, a hash function supporting inputs of length upto 2 − 1 bits and hash outputs of length upto 512 bits. Notably, Fugue is not based on a compression function. Rather, it is directly a hash function that supports variable-length inputs. The starting point for Fugue is the hash function Grindahl, but it extends that design to protect against the kind of attacks that were develope...
Nathanson was the pioneer in introducing the concepts of Number Theory, particularly, the “Theory of Congruences” in Graph Theory, thus paved the way for the emergence of a new class of graphs, namely “Arithmetic Graphs”. Cayley graphs are another class of graphs associated with the elements of a group. If this group is associated with some arithmetic function then the Cayley graph becomes an A...
Speirs II, William Robert Ph.D., Purdue University, May, 2007. Dynamic Cryptographic Hash Functions. Major Professor: Samuel S. Wagstaff, Jr. This dissertation introduces a new type of cryptographic hash function, the dynamic cryptographic hash function. Dynamic cryptographic hash functions differ from traditional hash functions because they require a second parameter, the security parameter. T...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید