نتایج جستجو برای: sha 3

تعداد نتایج: 1812667  

Journal: :IACR Cryptology ePrint Archive 2010
Kazuyuki Kobayashi Jun Ikegami Shin'ichiro Matsuo Kazuo Sakiyama Kazuo Ohta

As a result of extensive analyses on cryptographic hash functions, NIST started an open competition for selecting a new standard hash function SHA-3. One important aspect of this competition is in evaluating hardware implementations and in collecting much attention of researchers in this area. For a fair comparison of the hardware performance, we propose an evaluation platform, a hardware desig...

2012
Kashif Latif M Muzaffar Rao Arshad Aziz Athar Mahboob

Cryptographic hash functions are at the heart of many information security applications like digital signatures, message authentication codes (MACs), and other forms of authentication. In consequence of recent innovations in cryptanalysis of commonly used hash algorithms, NIST USA announced a publicly open competition for selection of new standard Secure Hash Algorithm called SHA-3. An essentia...

2016
Matthew Amy Olivia Di Matteo Vlad Gheorghiu Michele Mosca Alex Parent John M. Schanck

Matthew Amy,1, 2 Olivia Di Matteo,1, 3 Vlad Gheorghiu,1, 4, ∗ Michele Mosca,1, 4, 5, 6 Alex Parent,1, 3 and John Schanck1, 4 Institute for Quantum Computing, University of Waterloo, Waterloo, ON, N2L 3G1, Canada David R. Cheriton School of Computer Science, University of Waterloo, Waterloo, ON, N2L 3G1, Canada Department of Physics & Astronomy, University of Waterloo, Waterloo, ON, N2L 3G1, Can...

2009
Vlastimil Klima Danilo Gligoroski

Blue Midnight Wish is one of the 14 candidates in the second round of the NIST SHA-3 competition [1]. In this paper we present a decomposition of the Blue Midnight Wish core functions, what gives deeper look at the Blue Midnight Wish family of hash functions and a tool for their cryptanalysis. We used this decomposition for better understanding the insights of Blue Midnight Wish functions and t...

2008
Guido Bertoni Joan Daemen Michaël Peeters Gilles Van Assche

2009
Dmitry Khovratovich Ivica Nikolic Ralf-Philipp Weinmann

Journal: :The Journal of pharmacology and experimental therapeutics 2008
Naoe Okamura Stephen A Habay Joanne Zeng A Richard Chamberlin Rainer K Reinscheid

Neuropeptide S (NPS) has been shown to modulate arousal, sleep wakefulness, anxiety-like behavior, and feeding after central administration of the peptide agonist to mice or rats. We report here the chemical synthesis and pharmacological characterization of SHA 66 (3-oxo-1,1-diphenyl-tetrahydro-oxazolo[3,4-a]pyrazine-7-carboxylic acid benzylamide) and SHA 68 (3-oxo-1,1-diphenyl-tetrahydro-oxazo...

Journal: :IACR Cryptology ePrint Archive 2012
Shay Gueron

j-lanes hashing is a tree mode that splits an input message to j slices, computes j independent digests of each slice, and outputs the hash value of their concatenation. We demonstrate the performance advantage of j-lanes hashing on SIMD architectures, by coding a 4-lanes-SHA-256 implementation and measuring its performance on the latest 3 Generation Intel Core. For message ranging 2KB to 132KB...

2010
Stefan Tillich Martin Feldhofer Mario Kirschbaum Thomas Plos Jörn-Marc Schmidt Alexander Szekely

Hash functions are a core part of many protocols that are in daily use. Following recent results that raised concerns regarding the security of the current hash standards, the National Institute of Standards and Technology (NIST) pronounced a competition to find a new Secure Hash Algorithm (SHA), the SHA-3. An important criterion for the new standard is not only its security, but also the perfo...

2003
Yong-Sork HER Kouichi SAKURAI

The cryptographic hash function provides the services of information security, authentication, integrity, non-reputation in a branch of information secret. A cryptographic hash function has been developed since MD4 was proposed by Rivest. In present, U.S standard of a hash function is SHA-1 with 160 bits of output length. It is difficult to be sure of a security of a hash function with 160 bits...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید