نتایج جستجو برای: hash function

تعداد نتایج: 1218873  

Journal: :International Journal on Perceptive and Cognitive Computing 2016

Journal: :Annales UMCS, Informatica 2012
Tomasz Bilski Krzysztof Bucholc Anna Grocholewska-Czurylo Janusz Stoklosa

Hash functions are used to generate a short form of an original message of any size. This short form is called a hash of a message or a message digest and is used in many cryptographic applications including message integrity verification and message authentication, in which case a keyed hash function is used. Hash function h operates on a message m of an arbitrary length. The result is a hash ...

Journal: :Theor. Comput. Sci. 2013
Shlomi Dolev Limor Lahiani Yinnon A. Haviv

We propose a new hash function, the unique-permutation hash function, and a performance analysis of its hash computation. Following the notations of [15], the cost of a hash function h is denoted by Ch(k,N) and stands for the expected number of table entries that are checked when inserting the (k + 1) key to a hash table of size N , where k out of N table entries are filled by previous insertio...

Journal: :Tatra Mountains Mathematical Publications 2010

2016
Yu-Guang Yang Peng Xu Rui Yang Yi-Hua Zhou Wei-Min Shi

Quantum information and quantum computation have achieved a huge success during the last years. In this paper, we investigate the capability of quantum Hash function, which can be constructed by subtly modifying quantum walks, a famous quantum computation model. It is found that quantum Hash function can act as a hash function for the privacy amplification process of quantum key distribution sy...

2012
Piyush Garg Namita Tiwari

To maintain data integrity hash functions are generally used. Hash function is one type of cryptographic primitives, which provide an assurance for data integrity. NAS has designed SHA hash functions which are the set of cryptographic hash function. There are so many SHA function existing in which SHA-1 produces message digest that is of 160 bits long. Later in SHA-1 has been identified securit...

1998
Sang-Uk Shin Kyung Hyune Rhee DaeHyun Ryu Sangjin Lee

Several fast software hash functions have been proposed since the hash function MD4 was introduced by R. Rivest in 1990. At the moment, SHA-1, RIPEMD-160, and HAVAL are known as secure dedicated hash functions in MDx-family hash functions. In this paper, we propose a new hash function based on advantages of these three hash functions, which keeps the maximum security of them and is more efficie...

2003
John Edward Silva

To understand the viability of using hash functions to verify integrity and source of information, one must first examine the properties and origin of the basic hash function. The standard hash function serves as a basis for the discussion of Cryptographic Hash Functions. There are several hash functions currently in use today, including MD5 and SHA1. By examining the history and security avail...

Journal: :Science China Information Sciences 2010

2008
Christophe Petit Nicolas Veyrat-Charvillon Jean-Jacques Quisquater

Recent breakthroughs concerning the current standard SHA-1 prompted NIST to launch a competition for a new secure hash algorithm [1,13]. Provably secure hash functions (in the sense that their security relates to the hardness of some mathematical problems [5,7,9,12]) are particularly interesting from a theoretical point of view but are often much slower than heuristic functions like SHA. In thi...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید