نتایج جستجو برای: hash function

تعداد نتایج: 1218873  

Journal: :Revue Africaine de la Recherche en Informatique et Mathématiques Appliquées 2011

Journal: :International Journal of Electronics and Telecommunications 2023

In this paper, we propose a novel hash function based on irregularly decimated chaotic map. The called SHAH is two Tinkerbell maps filtered with irregular decimation rule. Exact study has been provided the scheme using distribution analysis, sensitivity static analysis of diffusion and confusion, collision analysis. experimental data show that satisfied admirable level security.

2015
Zhijie Shi Bing Wang

where M is the input message and h is the hash generated by the hash algorithm H . Normally, the size of the hash h is fixed by the algorithm. For a cryptographic hash function, the hash length should be large enough to prevent an attack from finding two or more messages that generate the same hash. Currently, the most commonly used hash algorithms are MD5 [1] and SHA-2 [2]. In general, the cry...

Journal: :Journal of Physics: Conference Series 2017

Journal: :DEStech Transactions on Engineering and Technology Research 2019

Journal: :International Journal on Recent and Innovation Trends in Computing and Communication 2019

Journal: :International Journal of Computer Network and Information Security 2012

Journal: :Wasit journal of computer and mathematics science 2022

In the recent decade, global community has been one of world's most prominent targets terrorist strikes. There is still study being done and improved efficiency procedures needed in this sector, however security forces law enforcement agencies are creating launching high weaponry to secure their territories. a huge necessity include greater level protection into military vehicles wake several a...

2008
Andrey Bogdanov Gregor Leander Christof Paar Axel Poschmann Matthew J. B. Robshaw Yannick Seurin

The security challenges posed by RFID-tag deployments are wellknown. In response there is a rich literature on new cryptographic protocols and an on-tag hash function is often assumed by protocol designers. Yet cheap tags pose severe implementation challenges and it is far from clear that a suitable hash function even exists. In this paper we consider the options available, including constructi...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید