Articles with "hash function" as a keyword



Photo by scottwebb from unsplash

Group hash function-based enhancing network security for network service providence

Sign Up to like & get
recommendations!
Published in 2019 at "Soft Computing"

DOI: 10.1007/s00500-019-04020-4

Abstract: Providing security becomes a more important task due to the increase in network users and cost of network resources. So, consider this issue to propose a new group hash function-based enhanced and maintain integrity and… read more here.

Keywords: service; security; network; hash function ... See more keywords
Photo by nampoh from unsplash

Improved cryptanalysis of step-reduced SM3

Sign Up to like & get
recommendations!
Published in 2017 at "Science China Information Sciences"

DOI: 10.1007/s11432-017-9119-6

Abstract: SM3 is the Chinese hash standard and is standardized in GB/T 32905-2016 [1]. As a hash function, it must fulfill three security requirements, collision resistance, preimage resistance, and second preimage resistance. During the ongoing evaluation,… read more here.

Keywords: boomerang attack; step; preimage; hash function ... See more keywords
Photo by hudsoncrafted from unsplash

A new design paradigm for provably secure keyless hash function with subsets and two variables polynomial function

Sign Up to like & get
recommendations!
Published in 2019 at "Journal of King Saud University - Computer and Information Sciences"

DOI: 10.1016/j.jksuci.2019.10.003

Abstract: Abstract Provably secure keyless hash function uses Random Oracle (RO) or Sponge principles for the design and construction of security-centric hash algorithms. It capitalizes the aforesaid principles to produce outcomes like MD2, MD5, SHA-160, SHA-224/256,… read more here.

Keywords: provably secure; polynomial function; sha; hash function ... See more keywords
Photo by bagasvg from unsplash

Application of Hash Function on FMCW Based Millimeter-Wave Radar Against DRFM Jamming

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Access"

DOI: 10.1109/access.2019.2928000

Abstract: Transport innovations and technological improvements have increased attention to specific techniques of communications, such as millimeter-wave radars used in autonomous vehicles (AVs). In order to improve the performance of antijamming capability of a millimeter-wave radar,… read more here.

Keywords: millimeter wave; wave radar; function; hash function ... See more keywords
Photo by joakimnadell from unsplash

FPGA-Based Lightweight Hardware Architecture of the PHOTON Hash Function for IoT Edge Devices

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Access"

DOI: 10.1109/access.2020.3038219

Abstract: The design of cryptographic engines for the Internet of Things (IoT) edge devices and other ultralightweight devices is a crucial challenge. The emergence of such resource-constrained devices raises significant challenges to current cryptographic algorithms. PHOTON… read more here.

Keywords: hash; photon hash; architecture; hash function ... See more keywords
Photo from wikipedia

A Novel Hash Function Based on a Chaotic Sponge and DNA Sequence

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Access"

DOI: 10.1109/access.2021.3049881

Abstract: Many chaos-based hash functions have convoluted designs that are not based on proper design principles, complicating the verification of security claims. We address this problem by proposing a hash function based on a chaotic sponge… read more here.

Keywords: dna; hash function; sponge; dna sequence ... See more keywords
Photo from wikipedia

Robust Security for Health Information by ECC with Signature Hash Function in WBAN

Sign Up to like & get
recommendations!
Published in 2018 at "Indonesian Journal of Electrical Engineering and Computer Science"

DOI: 10.11591/ijeecs.v11.i1.pp256-262

Abstract: Wireless Body Area Networks (WBANs) are fundamental technology in health care that permits the information of a patient’s essential body parameters to be gathered by the sensors. However, the safety and concealment defense of the… read more here.

Keywords: health; information; signature; hash function ... See more keywords
Photo from wikipedia

Parallel optical hash function based on the interaction between linearly polarized light and multiple-scattering media.

Sign Up to like & get
recommendations!
Published in 2022 at "Applied optics"

DOI: 10.1364/ao.458422

Abstract: A method is proposed for constructing a cryptographic hash function based on the interaction between linearly polarized light and multiple-scattering media in a parallel fashion. It is well known that an unpredictable noise-like speckle pattern… read more here.

Keywords: linearly polarized; hash function; function based; polarized light ... See more keywords