Zobrazeno 1 - 9
of 9
pro vyhledávání: '"Dhananjoy Dey"'
Publikováno v:
Journal of Applied Computer Science & Mathematics, Vol 12, Iss 1, Pp 9-13 (2018)
Hash functions have prominent role in cryptography because of their ubiquitous applications in real world. Earlier, it was used for authentication only but with continuous research and development, it has been started using in almost every branch of
Externí odkaz:
https://doaj.org/article/45d62a0cbe924274a6c5491ed9f653f1
Publikováno v:
Journal of Algebra and Its Applications.
Proxy signature schemes can be used in all the scenarios where a signer is not able to sign an important message. In some cases which involve a group of proxy signers, the anonymity of the proxy signer is required. We propose the first multivariate a
Publikováno v:
Lecture Notes in Electrical Engineering ISBN: 9789811973451
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::110c1f8f896c5a1cbbe47fcc3eb45585
https://doi.org/10.1007/978-981-19-7346-8_13
https://doi.org/10.1007/978-981-19-7346-8_13
Publikováno v:
Proceedings of the Seventh International Conference on Mathematics and Computing ISBN: 9789811668890
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::f5666b79807e1644b4acfdad9c729bac
https://doi.org/10.1007/978-981-16-6890-6_7
https://doi.org/10.1007/978-981-16-6890-6_7
Publikováno v:
Information Processing Letters. 181:106357
Publikováno v:
Cryptologia. 43:372-390
GOST-R 34.11-94 is a Russian standard cryptographic hash function that was introduced in 1994 by the Russian Federal Agency for the purposes of information processing, information security, and dig...
Publikováno v:
International Journal of Computer Science and Information Technology. 4:159-168
In this paper we describe an improved version of HF -hash [7] viz. R-hash: Hash Function Using Random Quadratic Polynomials Over GF(2). The compression function of HF -hash consists of 32 polynomials with 64 variables over GF(2), which were taken fro
Publikováno v:
Defence Science Journal. 67:636
A new hash function HeW: A hash function based on light weight block cipher FeW is proposed in this paper. The compression function of HeW is based on block cipher FeW. It is believed that key expansion algorithm of block cipher slows down the perfor
Publikováno v:
Advances in Intelligent Systems and Computing ISBN: 9783642301100
The cryptographic hash function Grostl is one of the five finalists of SHA-3 competition organized by US National Institute of Standards and Technology (NIST). In this paper we propose a modified Grostl-256 hash algorithm, which is 1.2 times faster t
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::f462a2274976591fe480e1a45c631553
https://doi.org/10.1007/978-3-642-30111-7_77
https://doi.org/10.1007/978-3-642-30111-7_77