-
1
Analysis of cryptographic hash functions
Published 2011“…This thesis concentrates on analysis of cryptographic hash functions, one of the most important primitives used in the modern cryptography. …”
Get full text
Thesis -
2
Low-Complexity Cryptographic Hash Functions
Published 2021“…Cryptographic hash functions are efficiently computable functions that shrink a long input into a shorter output while achieving some of the useful security properties of a random function. …”
Get full text
Article -
3
Broad view of cryptographic hash functions
Published 2013“…Cryptographic hash function is a function that takes an arbitrary length as an input and produces a fixed size of an output. …”
Get full text
Article -
4
Theoretical and Experimental Analysis of Cryptographic Hash Functions
Published 2019-03-01Subjects: “…cryptographic hash function…”
Get full text
Article -
5
-
6
SHA-1 and MD5 Cryptographic Hash Functions: Security Overview
Published 2015-02-01“…Despite their obsolescence and recommendations they are phased out from production environment, MD5 and SHA-1 cryptographic hash functions remain defaults frequently offered in many applications, e.g., database managers. …”
Get full text
Article -
7
High Performance and Low Power Hardware Implementation for Cryptographic Hash Functions
Published 2014-03-01Get full text
Article -
8
ANALYSIS OF IMPLEMENTATIONS OF THE CRYPTOGRAPHIC HASH FUNCTION SHA-1 BASED ON PIPELINE CIRCUITS
Published 2019-06-01Subjects: “…cryptographic hash function sha-1…”
Get full text
Article -
9
Lightweight Cryptographic Hash Functions: Design Trends, Comparative Study, and Future Directions
Published 2022-01-01Subjects: “…lightweight cryptographic hash function…”
Get full text
Article -
10
A collision resistant cryptographic hash function based on cellular automata rules
Published 2013“…Following the framework introduced here, a dedicated cryptographic hash function named STITCH-256 was introduced. …”
Get full text
Thesis -
11
Two New Lightweight Cryptographic Hash Functions Based on Saturnin and Beetle for the Internet of Things
Published 2023-01-01Subjects: “…Lightweight cryptographic hash function…”
Get full text
Article -
12
Integrity verification for digital Holy Quran verses using cryptographic hash function and compression
Published 2020-01-01“…The main task of the cryptographic hash function is to assure the integrity of the transmitted data. …”
Get full text
Article -
13
An adaptive image steganography algorithm based on the use of non-cryptographic hash functions for data extraction
Published 2023-06-01“…An adaptive steganography algorithm for data hiding in full-color images based on iterative introduction of minor distortions into blocks of container images and the use of high-speed non-cryptographic hash functions for data extraction is considered. …”
Get full text
Article -
14
-
15
-
16
Comparison of power consumption in pipelined implementations of the BLAKE3 cipher in FPGA devices
Published 2024-03-01Subjects: “…cryptographic hash function…”
Get full text
Article -
17
Comparison of power consumption in pipelined implementations of the BLAKE3 cipher in FPGA devices
Published 2024-03-01Subjects: “…cryptographic hash function…”
Get full text
Article -
18
Reversible and Plausibly Deniable Covert Channels in One-Time Passwords Based on Hash Chains
Published 2021-01-01Subjects: “…cryptographic hash function…”
Get full text
Article -
19
Cryptanalysis of Curl-P and Other Attacks on the IOTA Cryptocurrency
Published 2020-09-01Subjects: Get full text
Article -
20
Applying Grover's Algorithm to Hash Functions: A Software Perspective
Published 2022-01-01Subjects: “…Cryptographic hash function…”
Get full text
Article