Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Showing 1–2 of 2 results for author: Motara, Y

Searching in archive cs. Search in all archives.
.
  1. arXiv:1609.00616  [pdf, other

    cs.CR

    SHA-1 and the Strict Avalanche Criterion

    Authors: Yusuf Motara, Barry Irwin

    Abstract: The Strict Avalanche Criterion (SAC) is a measure of both confusion and diffusion, which are key properties of a cryptographic hash function. This work provides a working definition of the SAC, describes an experimental methodology that can be used to statistically evaluate whether a cryptographic hash meets the SAC, and uses this to investigate the degree to which compression function of the SHA-… ▽ More

    Submitted 2 September, 2016; originally announced September 2016.

    Comments: 6 pages in Information Security South Africa (ISSA) 2016

  2. arXiv:1201.5728  [pdf, ps, other

    cs.CR cs.PL cs.SE

    Functional Programming and Security

    Authors: Yusuf Moosa Motara

    Abstract: This paper analyses the security contribution of typical functional-language features by examining them in the light of accepted information security principles. Imperative and functional code are compared to illustrate various cases. In conclusion, there may be an excellent case for the use of functional languages on the grounds of better security; however, empirical research should be done to va… ▽ More

    Submitted 27 January, 2012; originally announced January 2012.