Showing 1 - 20 results of 80 for search '"cryptographic hash function"', query time: 0.31s Refine Results
  1. 1

    Analysis of cryptographic hash functions by Guo, Jian

    Published 2011
    “…This thesis concentrates on analysis of cryptographic hash functions, one of the most important primitives used in the modern cryptography. …”
    Get full text
    Thesis
  2. 2

    Low-Complexity Cryptographic Hash Functions by Applebaum, Benny, Haramaty-Krasne, Naama, Ishai, Yuval, Kushilevitz, Eyal, Vaikuntananthan, Vinod

    Published 2021
    “…Cryptographic hash functions are efficiently computable functions that shrink a long input into a shorter output while achieving some of the useful security properties of a random function. …”
    Get full text
    Article
  3. 3

    Broad view of cryptographic hash functions by Alahmad, Mohammad, Alshaikhli, Imad Fakhri Taha

    Published 2013
    “…Cryptographic hash function is a function that takes an arbitrary length as an input and produces a fixed size of an output. …”
    Get full text
    Article
  4. 4
  5. 5
  6. 6

    SHA-1 and MD5 Cryptographic Hash Functions: Security Overview by Roman Jasek

    Published 2015-02-01
    “…Despite their obsolescence and recommendations they are phased out from production environment, MD5 and SHA-1 cryptographic hash functions remain defaults frequently offered in many applications, e.g., database managers. …”
    Get full text
    Article
  7. 7
  8. 8

    ANALYSIS OF IMPLEMENTATIONS OF THE CRYPTOGRAPHIC HASH FUNCTION SHA-1 BASED ON PIPELINE CIRCUITS by E. V. Listopad

    Published 2019-06-01
    Subjects: “…cryptographic hash function sha-1…”
    Get full text
    Article
  9. 9
  10. 10

    A collision resistant cryptographic hash function based on cellular automata rules by Jamil, Norziana

    Published 2013
    “…Following the framework introduced here, a dedicated cryptographic hash function named STITCH-256 was introduced. …”
    Get full text
    Thesis
  11. 11
  12. 12

    Integrity verification for digital Holy Quran verses using cryptographic hash function and compression by Mishal Almazrooie, Azman Samsudin, Adnan Abdul-Aziz Gutub, Muhammad Syukri Salleh, Mohd Adib Omar, Shahir Akram Hassan

    Published 2020-01-01
    “…The main task of the cryptographic hash function is to assure the integrity of the transmitted data. …”
    Get full text
    Article
  13. 13

    An adaptive image steganography algorithm based on the use of non-cryptographic hash functions for data extraction by М.А. Dryuchenko

    Published 2023-06-01
    “…An adaptive steganography algorithm for data hiding in full-color images based on iterative introduction of minor distortions into blocks of container images and the use of high-speed non-cryptographic hash functions for data extraction is considered. …”
    Get full text
    Article
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20

    Applying Grover's Algorithm to Hash Functions: A Software Perspective by Richard H. Preston

    Published 2022-01-01
    Subjects: “…Cryptographic hash function…”
    Get full text
    Article