نتایج جستجو برای: cayley hash function

تعداد نتایج: 1221998  

1992
Xuejia Lai James L. Massey

Iterated hash functions based on block ciphers are treated. Five attacks on an iterated hash function and on its round function are formulated. The wisdom of strengthening such hash functions by constraining the last block of the message to be hashed is stressed. Schemes for constructing m-bit and 2m-bit hash round functions fromm-bit block ciphers are studied. A principle is formalized for eva...

2013
Mohammad A. AlAhmad Imad Fakhri Alshaikhli

Cryptographic hash function is a function that takes an arbitrary length as an input and produces a fixed size of an output. The viability of using cryptographic hash function is to verify data integrity and sender identity or source of information. This paper provides a detailed overview of cryptographic hash functions. It includes the properties, classification, constructions, attacks, applic...

Journal: :CoRR 2004
William F. Gilreath

Sorting and hashing are two completely different concepts in computer science, and appear mutually exclusive to one another. Hashing is a search method using the data as a key to map to the location within memory, and is used for rapid storage and retrieval. Sorting is a process of organizing data from a random permutation into an ordered arrangement, and is a common activity performed frequent...

Journal: :IACR Cryptology ePrint Archive 2005
Praveen Gauravaram William Millan Juan Manuel González Nieto

The design principle of Merkle-Damg̊ard construction is collision resistance of the compression function implies collision resistance of the hash function. Recently multi-block collisions have been found on the hash functions MD5, SHA-0 and SHA-1 using differential cryptanalysis. These multi-block collisions raise several questions on some definitions and properties used in the hash function lit...

Journal: :J. Inf. Sci. Eng. 2014
Jian Zou Wenling Wu Shuang Wu Le Dong

The Grøstl hash function is one of the five finalists in the third round of SHA-3 competition hosted by NIST. In this paper, we propose some improved (pseudo) preimage attacks on the Grøstl hash function by using some techniques, such as subspace preimage attack and the guess-and-determine technique. We present the improved pseudo preimage attacks on 5-round Grøstl-256 hash function and 8-round...

Journal: :IACR Cryptology ePrint Archive 2008
Donghoon Chang Jaechul Sung Seokhie Hong Sangjin Lee

In case of security analysis of hash functions, finding a good collision-inducing differential paths has been only focused on. However, it is not clear how differential paths of a hash function influence the securities of schemes based on the hash function. In this paper, we show that any differential path of a hash function can influence the securities of schemes based on the hash function. We...

Journal: :Indonesian Journal of Electrical Engineering and Computer Science 2018

Journal: :International Journal on Perceptive and Cognitive Computing 2016

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید