Zobrazeno 1 - 10
of 76
pro vyhledávání: '"Merkle–Damgård construction"'
Autor:
Tiwari, Harshvardhan
Publikováno v:
Journal of Information and Organizational Sciences. 41(2):283-304
Externí odkaz:
https://www.ceeol.com/search/article-detail?id=592239
Autor:
Harshvardhan Tiwari
Publikováno v:
Journal of Information and Organizational Sciences, Vol 41, Iss 2, Pp 283-304 (2017)
Cryptographic hash function is an important cryptographic tool in the field of information security. Design of most widely used hash functions such as MD5 and SHA-1 is based on the iterations of compression function by Merkle-Damgård construction me
Externí odkaz:
https://doaj.org/article/e6732c3b987e42418a5c6ac13c7150c3
Autor:
Tiwari Harshvardhan, Asawa Krishna
Publikováno v:
Open Computer Science, Vol 4, Iss 2, Pp 67-85 (2014)
Externí odkaz:
https://doaj.org/article/e3abfaa0c90d49b18ab1da39a071e5fa
Publikováno v:
Lecture Notes in Electrical Engineering ISBN: 9789813368927
In this paper, we design a lightweight hash function suitable for fast applications. The proposed hash function is intended to be used as a secondary component in cryptographic and pseudo-cryptographic applications (e.g., pseudorandom number generato
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::3995b1c3032f46ca13b1b11889922870
https://doi.org/10.1007/978-981-33-6893-4_46
https://doi.org/10.1007/978-981-33-6893-4_46
Publikováno v:
Cryptologia. 43:372-390
GOST-R 34.11-94 is a Russian standard cryptographic hash function that was introduced in 1994 by the Russian Federal Agency for the purposes of information processing, information security, and dig...
Publikováno v:
Advances in Intelligent Systems and Computing ISBN: 9789811554100
ICMC
ICMC
In this paper, we propose a new keyed one-way double-block-length hash function by using Non-linear Cellular Automata (CA), named as NCASH. The structure of NCASH mainly follows the Wide-Pipe construction, which is a modified Merkle Damgard construct
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::a12093ff0f85b6c2394fd9c97ced54fe
https://doi.org/10.1007/978-981-15-5411-7_8
https://doi.org/10.1007/978-981-15-5411-7_8
Autor:
I. A. Gribanova
Publikováno v:
Prikladnaya diskretnaya matematika. Prilozhenie. :157-160
Publikováno v:
IEEE Access, Vol 5, Pp 7816-7825 (2017)
Cryptographic hash functions have become the basis of modern network computing for identity authorization and secure computing; protocol consistency of cryptographic hash functions is one of the most important properties that affect the security and
Publikováno v:
Advanced Science Letters. 22:2538-2542
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.