loading
VLSI implementations of the cryptographic hash functions MD6 and ïrRUPT
2009 Edition, May 1, 2009 - IEEE - Institute of Electrical and Electronics Engineers, Inc.

A public competition organized by the NIST recently started, with the aim of identifying a new standard for cryptographic hashing (SHA-3). Besides a high security level, candidate algorithms should show good performance on various platforms. While an average...

Verification of Implementations of Cryptographic Hash Functions
2017 Edition, Volume 5, January 1, 2017 - IEEE - Institute of Electrical and Electronics Engineers, Inc.

Cryptographic hash functions have become the basis of modern network computing for identity authorization and secure computing; protocol consistency of cryptographic hash functions is one of the most important...

Cryptographic hash function Edon-R′
2009 Edition, May 1, 2009 - IEEE - Institute of Electrical and Electronics Engineers, Inc.

In this paper we describe in details the tweaked cryptographic hash function Edon-R that we denote as EDON-R'. EDON-R' was submitted as a candidate for SHA-3 hash competition organized by National Institute of Standards and Technology (NIST)....

Cryptographic Hash Function: A High Level View
2013 Edition, September 1, 2013 - IEEE - Institute of Electrical and Electronics Engineers, Inc.

Cryptographic hash function verifies data integrity and sender identity or source of information. The task is accomplished by taking a variable bit patterns as an input then produces a fixed bit patterns of output. This paper provides a detailed...

Finding Bugs in Cryptographic Hash Function Implementations
Volume PP - IEEE - Institute of Electrical and Electronics Engineers, Inc.

Cryptographic hash functions are security-critical algorithms with many practical applications, notably in digital signatures. Developing an approach to test them can be particularly difficult, and bugs can remain unnoticed for many years. We revisit the National...

Cryptographic hash function Blue Midnight Wish
2009 Edition, May 1, 2009 - IEEE - Institute of Electrical and Electronics Engineers, Inc.

The cryptographic hash function Blue Midnight Wish was submitted as a candidate for SHA-3 hash competition organized by National Institute of Standards and Technology (NIST).

Internationally standardized efficient cryptographic hash function
2011 Edition, July 1, 2011 - INSTICC

We claim that the European research and development community can initiate and sustain a process of designing a secure cryptographic hash function that will be widely accepted by the industry due to its superior performances in software...

Finding Bugs in Cryptographic Hash Function Implementations
2018 Edition, Volume 67, September 1, 2018 - IEEE - Institute of Electrical and Electronics Engineers, Inc.

Cryptographic hash functions are security-critical algorithms with many practical applications, notably in digital signatures. Developing an approach to test them can be particularly difficult, and bugs can remain unnoticed for many years. We revisit the National...

Towards an automatic design of non-cryptographic hash function
2011 Edition, August 1, 2011 - IEEE - Institute of Electrical and Electronics Engineers, Inc.

This paper presents an automatic approach to a non-cryptographic hash function design based on grammar guided genetic programming. The paper describes how it is possible to design a non-cryptographic hash function, implementation issues such...

High speed calculation of cryptographic hash functions by CNN chips
1998 Edition, January 1, 1998 - IEEE - Institute of Electrical and Electronics Engineers, Inc.

The paper is concerned with the implementation of cryptographic hash functions on the regular array of simple cellular neural network (CNN) cells with periodic boundary conditions. Cryptographic hash functions...

Advertisement