[PDF][PDF] Performance analysis of cryptographic hash functions suitable for use in blockchain

A Kuznetsov, I Oleshko, V Tymchenko… - International Journal of …, 2021 - academia.edu
… been no extensive analysis of hash functions, … analysis of cryptographic hash functions that
can be used in blockchain systems. The most common and applicable cryptographic hashing

Verification of implementations of cryptographic hash functions

D Wang, Y Jiang, H Song, F He, M Gu, J Sun - IEEE Access, 2017 - ieeexplore.ieee.org
… They investigated the security of lightweight designs for the future security of hash functions.
Analysis results in this paper are a good reference in construction of verification properties. …

Hash‐One: a lightweight cryptographic hash function

P Megha Mukundan, S Manayankath… - IET Information …, 2016 - Wiley Online Library
… As the property of collision resistance is crucial in cryptographic hash functions, we use
collision test to make sure the same. The number of collisions in specific number of bits in the …

Design and security analysis of two robust keyed hash functions based on chaotic neural networks

N Abdoun, S El Assad, O Deforges, R Assaf… - Journal of Ambient …, 2020 - Springer
designed, implemented, and analyzed the performance, in terms of security and speed, of
two proposed keyed Chaotic Neural Network (CNN) hash functions … The first hash function’s …

Design and analysis of new version of cryptographic hash function based on improved chaotic maps with induced DNA sequences

SMS Eldin, AAA El-Latif, SA Chelloug, M Ahmad… - IEEE …, 2023 - ieeexplore.ieee.org
… on the increasing hashing algorithm security. This paper proposes to present a modified
SHA-256 like hash algorithm by exploring the design principles of the two hash schemes (SHA-…

[PDF][PDF] Cryptographic hash functions

W Macharia - 2021 - researchgate.net
cryptographic hash functions are hash functions but not every hash function is a cryptographic
hash function… This paper describes what cryptographic hash functions are, what security …

A survey of lightweight cryptographic hash function

BT Hammad, N Jamil, ME Rusli, MR Zaba - 2017 - 194.127.137.90
hash algorithm. In this paper, a comprehensive survey of some lightweight cryptographic hash
functions … Apart from covering the analyses of these algorithms, the differences of these pri…

[PDF][PDF] Cryptographic Hash Functions and Attacks-A Detailed Study.

R Kundu, A Dutta - International Journal of Advanced …, 2020 - pdfs.semanticscholar.org
… of hash function is facing a new attack. The present paper provides an extensive study on
cryptographic hash functions … a detailed description of cryptographic hash algorithms. It also …

Low-complexity cryptographic hash functions

B Applebaum, N Haramaty-Krasne, Y Ishai… - 2017 - dspace.mit.edu
… the complexity of cryptographic hash functions. We start with … hash functions (CRH), which
prevent an efficient attacker from finding a pair of distinct inputs x, x on which the function has …

Finding bugs in cryptographic hash function implementations

N Mouha, MS Raunak, DR Kuhn… - IEEE transactions on …, 2018 - ieeexplore.ieee.org
… Motivated by the cryptographic properties that a hash function should satisfy, we develop
four tests. The Bit-Contribution Test checks if changes in the message affect the hash value, …