Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
This article presents a new Fast Hash-based File Existence Checking (FHFEC) method for archiving systems. During the archiving process, there are many submissions which are actually unchanged files that do not need to be re-archived. In... more
    • by 
    •   12  
      Computer ScienceArchivingPerformance AnalysisPerformance Evaluation
    • by 
    •   2  
      Cryptographic Hash FunctionPublic Key Cryptosystem
    • by 
    •   3  
      Computational ComplexityCryptographic Hash FunctionHash Function
Chaotic maps are used in the design of hash functions due to their characteristics that are analogous to cryptographic requirements. However, these maps are commonly implemented using floating point representation which has high... more
    • by 
    •   6  
      Chaos TheoryChaotic cryptographyHash FunctionsChaotic Map
The use of biometrics (e.g., fingerprints, irises, faces) for recognizing individuals is becoming increasingly popular and many applications are already available. Biometrics are intrinsically associated with individuals and cannot be... more
    • by 
    •   4  
      Cryptographic Hash FunctionDistributed Source CodingError Correction Code WordsError Correction Code
    • by 
    •   2  
      Cryptographic Hash FunctionHash Function
Cryptographic Hash Function (in short, CHF) is a useful tool for implementing one-wayencryptionthatishardtorestoretheplaintext. CHFisdefinedasafunctionfromsome set X to fixed sized string, with almost-injective property and hard to... more
    • by 
    •   5  
      MathematicsCellular AutomataCryptographyCryptographic Hash Function
In this paper, we propose a new hash function based on RC4 and we call it RC4-Hash. This proposed hash function produces variable length hash output from 16 bytes to 64 bytes. Our RC4-Hash has several advantages over many popularly known... more
    • by 
    •   32  
      ModelingWorkflowComputer SecurityCryptography
    • by 
    •   7  
      Public key cryptographyRandom Oracle ModelProxy SignatureHyperelliptic Curve
Summary Cryptographic hash function has been used extensively in many cryptographic protocols. Many of the hash functions generate the message digest thru a randomizing process of the original message. Subsequently a chaos system also... more
    • by 
    •   8  
      Mathematics of CryptographyChaos TheoryCryptographyHash Functions
    • by 
    •   6  
      Computer HardwareCryptographyNetwork ManagementCodes
    • by 
    •   4  
      Network SecurityNetworkCryptographic Hash FunctionHash Function
    • by 
    •   3  
      Security ManagementSAMCryptographic Hash Function
This article presents a new Fast Hash-based File Existence Checking (FHFEC) method for archiving systems. During the archiving process, there are many submissions that are actually unchanged files that do not need to be re-archived. In... more
    • by 
    •   12  
      Computer ScienceArchivingPerformance AnalysisPerformance Evaluation
In recent years, cryptologists have been delving into chaos theory to design more secure cryptographic primitives. However, many existing chaos-based algorithms are slow due to floating point operations. They are mostly sequential in... more
    • by 
    •   6  
      Chaos TheoryChaotic cryptographyHash FunctionsChaotic Map
    • by 
    •   9  
      Computer SecurityCryptographyDistributed SystemHashing
    • by 
    •   4  
      Cryptographic Hash FunctionDistributed Source CodingError Correction Code WordsError Correction Code
The cryptographic hash function Blue Midnight Wish was submitted as a candidate for SHA-3 hash competition organized by National Institute of Standards and Technology (NIST).
    • by 
    •   6  
      CryptographyResistanceNISTNational Institute of Standards and Technology
We have designed three fast implementations of recently proposed family of hash func- tions Edon{R. They produce message digests of length 256, 384 and 512 bits. We have deflned huge quasigroups of orders 2256, 2384 and 2512 by using only... more
    • by 
    •   4  
      Processing SpeedSecurity AnalysisCryptographic Hash FunctionHash Function
Cryptographic hash functions are symmetric primi-tives, used in many cryptographic protocols and as building blocks in many cryptographic functions. In general, a hash function maps a bitstring of any length, the input, to a fixed-length... more
    • by 
    •   4  
      Business performanceCryptographic Hash FunctionsCryptographic Hash FunctionHash Function
    • by 
    •   5  
      Security RequirementsSecurity AnalysisRandomized AlgorithmCryptographic Hash Function
    • by 
    •   5  
      Pseudo-Random Number GeneratorDesign and DevelopmentExperimental AnalysisCryptographic Hash Function
    • by 
    •   8  
      Group TheoryPure MathematicsCryptologyNumerical Analysis and Computational Mathematics
    • by 
    •   2  
      Cryptographic Hash FunctionHash Function
    • by 
    •   10  
      CryptographyField-Programmable Gate ArraysDistributed SystemData Protection
    • by 
    •   10  
      CryptographyField-Programmable Gate ArraysOpen SourcePerformance Evaluation
    • by 
    •   9  
      Pure MathematicsDesign RationaleFinite FieldCryptographic Hash Functions
    • by  and +1
    •   6  
      Human behaviorBanking systemSecurity ProtocolCryptographic Hash Function
The use of biometrics (e.g., fingerprints, irises, faces) for recognizing individuals is becoming increasingly popular and many applications are already available. Biometrics are intrinsically associated with individuals and cannot be... more
    • by  and +1
    •   3  
      Cryptographic Hash FunctionDistributed Source CodingError Correction Code Words
    • by 
    •   19  
      Computer ScienceComputer ArchitectureFPGAVLSI
    • by 
    •   14  
      Computer ScienceDistributed ComputingPrivacyComputer Security
Nowadays, a gigantic number of constrained devices are connected to the internet. The devices interact with each other through the wireless sensor network (WSN) and provide the users with new experiences. The pervasive of devices on the... more
    • by 
    •   8  
      Computer ScienceComputer SecurityCryptographyComputer Network
In this paper, we propose hPIN/hTAN, a low-cost hardware token based PIN/TAN system for protecting e-banking systems against the strong threat model where the adversary has full control over the user's computer. This threat model... more
    • by 
    •   8  
      Computer ScienceHuman behaviorBanking systemSecurity Protocol
Cryptography and Coding theory are believed to have common roots. Foundations for both the fields were laid down by Claude Shannon. There is, however, very little research being done to investigate the relationship between the two and to... more
    • by 
    •   18  
      Coding TheoryChannel CodingCryptographyReed-Solomon Codes
Cryptographic hash functions had been very significant primitives to the cryptography. They have been utilized widely in cryptographic applications and most important of them is their use in the composition of efficient Message... more
    • by 
    •   9  
      CryptographyCryptanalysisSecure Hash AlgorithmRandom Number Generation
    • by 
    •   5  
      Provable SecurityIT SecurityRandom Oracle ModelCryptographic Hash Function
    • by 
    •   2  
      Cryptographic Hash FunctionHash Function
    • by 
    •   8  
      Cognitive ScienceBiometricsImage AnalysisMultimodal Biometrics
Abstract1— The use of biometrics (eg, fingerprints, irises, faces) for recognizing individuals is becoming increasingly popular and many applications are already available. Biometrics are intrinsically associated with individuals and... more
    • by 
    •   3  
      Cryptographic Hash FunctionDistributed Source CodingError Correction Code
    • by 
    •   6  
      Computer HardwareCryptographyNetwork ManagementCodes
    • by 
    •   13  
      Computer SecurityCryptographyEncryptionText
    • by  and +1
    •   12  
      ArchivingPerformance AnalysisPerformance EvaluationHash Table
HMAC is a widely used message authentication code and a pseudorandom function generator based on cryptographic hash functions such as MD5 and SHA-1. It has been standardized by ANSI, IETF, ISO and NIST. HMAC is proved to be secure as long... more
    • by 
    •   9  
      Computer SecurityCryptographyDistributed SystemHashing
    • by 
    •   6  
      Coding TheoryPure MathematicsElectrical And Electronic EngineeringCryptographic Hash Function
    • by 
    • Cryptographic Hash Function
    • by 
    •   7  
      Security AnalysisStatistical TestCryptographic AlgorithmCryptographic Hash Function
Signcryption is basically a cryptographic primitive which provides both signature and encryption functions simultaneously, but it is not useful when only one of the function is required. Generalized Signcryption (GSC) is a special... more
    • by 
    •   11  
      Hash FunctionsSigncryption and Trust level VANETPublic key cryptographyEngineering and Computer Science
    • by 
    •   6  
      Computer ScienceInformation TheoryData StructureData Protection
    • by 
    •   4  
      Computer ScienceEngineering TechnologyCryptographic Hash FunctionHash Function
Preneel, Govaerts, and Vandewalle (1993) considered the 64 most basic ways to construct a hash function from a blockcipher . They regarded 12 of these 64 schemes as secure, though no proofs or formal claims were given. Here we provide a... more
    • by 
    •   13  
      CryptographyPure MathematicsEncryptionCryptology