نتایج جستجو برای: sha 3
تعداد نتایج: 1812667 فیلتر نتایج به سال:
As a result of extensive analyses on cryptographic hash functions, NIST started an open competition for selecting a new standard hash function SHA-3. One important aspect of this competition is in evaluating hardware implementations and in collecting much attention of researchers in this area. For a fair comparison of the hardware performance, we propose an evaluation platform, a hardware desig...
Cryptographic hash functions are at the heart of many information security applications like digital signatures, message authentication codes (MACs), and other forms of authentication. In consequence of recent innovations in cryptanalysis of commonly used hash algorithms, NIST USA announced a publicly open competition for selection of new standard Secure Hash Algorithm called SHA-3. An essentia...
Matthew Amy,1, 2 Olivia Di Matteo,1, 3 Vlad Gheorghiu,1, 4, ∗ Michele Mosca,1, 4, 5, 6 Alex Parent,1, 3 and John Schanck1, 4 Institute for Quantum Computing, University of Waterloo, Waterloo, ON, N2L 3G1, Canada David R. Cheriton School of Computer Science, University of Waterloo, Waterloo, ON, N2L 3G1, Canada Department of Physics & Astronomy, University of Waterloo, Waterloo, ON, N2L 3G1, Can...
Blue Midnight Wish is one of the 14 candidates in the second round of the NIST SHA-3 competition [1]. In this paper we present a decomposition of the Blue Midnight Wish core functions, what gives deeper look at the Blue Midnight Wish family of hash functions and a tool for their cryptanalysis. We used this decomposition for better understanding the insights of Blue Midnight Wish functions and t...
Neuropeptide S (NPS) has been shown to modulate arousal, sleep wakefulness, anxiety-like behavior, and feeding after central administration of the peptide agonist to mice or rats. We report here the chemical synthesis and pharmacological characterization of SHA 66 (3-oxo-1,1-diphenyl-tetrahydro-oxazolo[3,4-a]pyrazine-7-carboxylic acid benzylamide) and SHA 68 (3-oxo-1,1-diphenyl-tetrahydro-oxazo...
j-lanes hashing is a tree mode that splits an input message to j slices, computes j independent digests of each slice, and outputs the hash value of their concatenation. We demonstrate the performance advantage of j-lanes hashing on SIMD architectures, by coding a 4-lanes-SHA-256 implementation and measuring its performance on the latest 3 Generation Intel Core. For message ranging 2KB to 132KB...
Hash functions are a core part of many protocols that are in daily use. Following recent results that raised concerns regarding the security of the current hash standards, the National Institute of Standards and Technology (NIST) pronounced a competition to find a new Secure Hash Algorithm (SHA), the SHA-3. An important criterion for the new standard is not only its security, but also the perfo...
The cryptographic hash function provides the services of information security, authentication, integrity, non-reputation in a branch of information secret. A cryptographic hash function has been developed since MD4 was proposed by Rivest. In present, U.S standard of a hash function is SHA-1 with 160 bits of output length. It is difficult to be sure of a security of a hash function with 160 bits...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید