نتایج جستجو برای: the tillich zemor hash function

تعداد نتایج: 16181744  

Journal: :IACR Cryptology ePrint Archive 2007
ZiJie Xu

In this paper I describe the construction of Dynamic SHA-2 family of cryptographic hash functions. They are built with design components from the SHA-2 family, but I use the bits in message as parameters of function G, R and ROTR operation in the new hash function. It enabled us to achieve a novel design principle: When message is changed, the calculation will be different. It makes the system ...

2006
Donghoon Chang Kishan Chand Gupta Mridul Nandi

In this paper, we propose a new hash function based on RC4 and we call it RC4-Hash. This proposed hash function produces variable length hash output from 16 bytes to 64 bytes. Our RC4-Hash has several advantages over many popularly known hash functions. Its efficiency is comparable with widely used known hash function (e.g., SHA-1). Seen in the light of recent attacks on MD4, MD5, SHA-0, SHA-1 ...

Journal: :International Journal of Future Generation Communication and Networking 2017

Journal: :Quantum Information Processing 2021

Abstract We present the implementation of Grover’s algorithm in a quantum simulator to perform search for preimages two scaled hash functions, whose design only uses modular addition, word rotation and bitwise exclusive or. Our provides means assess with precision scaling number gates depth full-fledged circuit designed find given digest. The detailed construction oracle shows that presence AND...

2012
Nidhi Sharma Alok Sharma Monika Sharma

The protection of information authentication is based on cryptographically secure hash function. A function that compresses an arbitrarily large message into a fixed small size message digest' is known as a hash function. The most currently used hash functions are based on block ciphers and the dedicated hash functions e. g. MD5, SHA-0 and SHA-1 etc. A hash function is said to be broken if...

Journal: :Núcleo do Conhecimento 2023

Este trabajo tiene como objetivo comprender cómo los historietas, también llamados cómics, son capaces de manifestar religiosidad, tomando perspectiva la teología cultura Paul Tillich. El principal delimitador del tema propuesto está en actitud marginación e infantilización las lo que ubica un lugar irrelevancia para mirada teológica. Surge entonces pregunta: ¿qué cómics? ¿Son arte? ¿Cuál es su...

Journal: :Journal of Research and Practice in Information Technology 2014
Shangjie Jin Shanshan Liu Meijian Li Yongjun Wang Peidai Xie Zhen Huang

Journal of Research and Practice in Information Technology, Vol. 46, No. 2/3, August 2014 Copyright© 2014, Australian Computer Society Inc. General permission to republish, but not for profi t, all or part of this material is granted, provided that the JRPIT copyright notice is given and that reference is made to the publication, to its date of issue, and to the fact that reprinting privileges ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه ارومیه 1377

the methods which are used to analyze microstrip antennas, are divited into three categories: empirical methods, semi-empirical methods and full-wave analysis. empirical and semi-empirical methods are generally based on some fundamental simplifying assumptions about quality of surface current distribution and substrate thickness. thses simplificatioms cause low accuracy in field evaluation. ful...

With the emerging concept of model transformation, information can be extracted from one or more source models to produce the target models. The conversion of these models can be done automatically with specific transformation languages. This conversion requires mapping between both models with the help of dynamic hash tables. Hash tables store reference links between the elements of the source...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید