• No results found

[PDF] Top 20 An Improved Hash Function Based on the Tillich-Zémor Hash Function

Has 10000 "An Improved Hash Function Based on the Tillich-Zémor Hash Function" found on our website. Below are the top 20 most common "An Improved Hash Function Based on the Tillich-Zémor Hash Function".

An Improved Hash Function Based on the Tillich-Zémor Hash Function

An Improved Hash Function Based on the Tillich-Zémor Hash Function

... the Tillich-Zémor based hash functions can not threat ...our hash function like other known provable secure hash functions is slower than today used hash functions ... See full document

7

A Fast New Cryptographic Hash Function Based on Integer Tent Mapping System

A Fast New Cryptographic Hash Function Based on Integer Tent Mapping System

... We attempt to get an idea about the effect of all the changes in the above message expansion schemes. For the single bit differences, Table 1 illustrates the comparison of the number of affected bits in message expansion ... See full document

10

A  Novel  Permutation-based  Hash  Mode  of  Operation  FP   and  the  Hash  Function  SAMOSA

A Novel Permutation-based Hash Mode of Operation FP and the Hash Function SAMOSA

... be improved close to n ...is based on only one assump- tion – like the Sponge and JH – that the underlying permutation should not display any structural weaknesses; note that the security of many ... See full document

49

A New Chaos Based Image Encryption and Decryption using a Hash Function

A New Chaos Based Image Encryption and Decryption using a Hash Function

... and improved diffusion approaches, which uses a simple table lookup and swapping techniques as a light weight replacement of the 1D chaotic map ...using hash functions to generate key for encryption and ... See full document

9

Security in Cloud Computing  Hash Function

Security in Cloud Computing Hash Function

... Client sends the data to the server which is known as Main Server. At the same time data is also back up to Multi Servers. In this method for data backup it involve with three Multi Server such as (SA 1(Server, ... See full document

5

A novel parallel hash function based on 3D chaotic map

A novel parallel hash function based on 3D chaotic map

... proposed hash function is a multi-threaded algo- rithm which works fine on both single and multi-core processors, while the speed of the algorithm eventually doubles on a multi-core ...the hash value ... See full document

12

Implementation of Secure Hash Function over SDP

Implementation of Secure Hash Function over SDP

... Abstract— VoIP (Voice over Internet Protocol) is a highly popular way of internet telephony that exists in today's world. Most of the mobile service providers are moving towards IP telephony because of its high ... See full document

12

lec 8 Crypto-graphic Tools

lec 8 Crypto-graphic Tools

... Message Message Hash function Digest Encryption Signature Hash function Digest Decryption Expected Digest Private Key Public Key.. All copyrights reserved by C.C[r] ... See full document

25

Improved  Cryptanalysis  on  Reduced-Round  GOST   and  Whirlpool  Hash  Function (Full  Version)

Improved Cryptanalysis on Reduced-Round GOST and Whirlpool Hash Function (Full Version)

... In this section, we improve the preimage attack on 6-round GOST-512 in [31]. First we reduce the time complexity from 2 505 to 2 496 by removing the unnecessary Meet-in-the- Middle (MitM) step. Then we show a memoryless ... See full document

19

STUDY OF HASH BASED BLOCK MATCHING FOR MOTION ESTIMATION

STUDY OF HASH BASED BLOCK MATCHING FOR MOTION ESTIMATION

... significantly improved by enabling full-frame level block ...the hash-based block matching, the proposed scheme will not bring great computation ...RDO based block matching proposes a more ... See full document

11

COFFE:  Ciphertext  Output  Feedback  Faithful  Encryption

COFFE: Ciphertext Output Feedback Faithful Encryption

... are encoded as one- or two-byte values depending on the size of the key, and describe at least the three least significant bytes of the input. For practical applications we recommend to use a key size of n bits. ... See full document

19

Analysis of the Hash Function – Modified Grøstl

Analysis of the Hash Function – Modified Grøstl

... This paper presents the analysis of Modified Grøstl algorithm in terms of efficiency, entropy test, avalanche effect along with performance evaluation in eBASH project.. This made to the[r] ... See full document

6

LHash:  A  Lightweight  Hash  Function (Full  Version)

LHash: A Lightweight Hash Function (Full Version)

... lightweight hash functions have also been ...lightweight hash function is constructed from block cipher PRESENT in Hirosei’s double-block mode ...[2] hash function proposed at CHES 2010 ... See full document

19

A  New  Standard  of  Ukraine:  The  Kupyna  Hash  Function

A New Standard of Ukraine: The Kupyna Hash Function

... the hash function and its addi- tional mode for message authentication code ...Kupyna hash function as it is given in the national standard of ... See full document

38

Parallelized Hashing via j Lanes and j Pointers Tree Modes, with Applications to SHA 256

Parallelized Hashing via j Lanes and j Pointers Tree Modes, with Applications to SHA 256

... This paper expands upon the j-lanes tree hashing mode which was proposed in [1]. It provides specifications, enhancements, and an updated performance analysis. The purpose is to suggest such modes for standardization. ... See full document

24

Lightweight  AE   and  HASH  in  a  Single  Round  Function

Lightweight AE and HASH in a Single Round Function

... for hash functions. One is based on Merkle-Damg˚ ard (MD)-structure, such as SHA-1[11], SHA-2[12] and ...is based on a sponge or sponge-like functions, such as Keccak[14], PHOTON[15], Quark[16], ... See full document

12

Cryptanalysis  of  the  Round-Reduced  Kupyna  Hash  Function

Cryptanalysis of the Round-Reduced Kupyna Hash Function

... Kupyna hash function was selected as the new Ukrainian standard DSTU 7564:2014 in ...Kupyna hash function is an AES-based primitive, which uses Merkle-Damg˚ ard com- pression ... See full document

16

Analysis  of  the  Kupyna-256  Hash  Function

Analysis of the Kupyna-256 Hash Function

... The hash function Kupyna was recently published as the Ukrainian standard DSTU ...compression function of similar AES-like hash ...compression function for 6 (out of 10) rounds of ... See full document

16

MGR  HASH  FUNCTION

MGR HASH FUNCTION

... A hash function is called near-collision resistant if it is infeasible to find two inputs with hash output differ in small number of bits ...MGR hash value is almost same (differ in small ... See full document

16

IJCSMC, Vol. 5, Issue. 5, May 2016, pg.531 – 539 A Hash Function System Based on Quadratic Function

IJCSMC, Vol. 5, Issue. 5, May 2016, pg.531 – 539 A Hash Function System Based on Quadratic Function

... is hash function. A hash function is a function that takes a set of characters called plaintext and converts it to a form that is very difficult to revert back to the original set of ... See full document

9

Show all 10000 documents...