Low-complexity cryptographic hash functions

B Applebaum, N Haramaty-Krasne, Y Ishai… - 2017 - dspace.mit.edu
… of a random function. The main focus of this work is on collision resistant hash functions (CRH)…
which the function has the same output.However, we will also consider universal one-way …

[PDF][PDF] Theoretical and experimental analysis of cryptographic hash functions

J Tchórzewski, A Jakóbik - Journal of Telecommunications and …, 2019 - bibliotekanauki.pl
… theoretical introduction to the cryptographic hash function theory and a statistical experimental
analysis of selected hash functions. The definition of hash functions, differences between …

Hash‐One: a lightweight cryptographic hash function

P Megha Mukundan, S Manayankath… - IET Information …, 2016 - Wiley Online Library
… As the property of collision resistance is crucial in cryptographic hash functions, we use
collision test to make sure the same. The number of collisions in specific number of bits in the …

A survey of lightweight cryptographic hash function

BT Hammad, N Jamil, ME Rusli, MR Zaba - 2017 - 194.127.137.90
hash algorithm. In this paper, a comprehensive survey of some lightweight cryptographic
hash functions will … We will provide a classification of these lightweight hash functions as well. …

[PDF][PDF] Cryptographic hash functions

W Macharia - 2021 - researchgate.net
cryptographic hash functions are hash functions but not every hash function is a cryptographic
hash function… This paper describes what cryptographic hash functions are, what security …

Finding bugs in cryptographic hash function implementations

N Mouha, MS Raunak, DR Kuhn… - IEEE transactions on …, 2018 - ieeexplore.ieee.org
… Motivated by the cryptographic properties that a hash function should satisfy, we … hash value,
and the Bit-Exclusion Test checks that changes beyond the last message bit leave the hash

Troika: a ternary cryptographic hash function

S Kölbl, E Tischhauser, P Derbez… - … , Codes and Cryptography, 2020 - Springer
… a secure cryptographic hash function over \(\mathbb {F}_{3}\). With all existing hash designs
… In this paper, we propose a new ternary hash function called Troika which is tailored for use …

Lightweight cryptographic hash functions: Design trends, comparative study, and future directions

S Windarta, S Suryadi, K Ramli, B Pranggono… - Ieee …, 2022 - ieeexplore.ieee.org
cryptographic hash function algorithms. In this paper, we discuss advanced lightweight
cryptographic hash functions … design trends, analyze cryptographic aspects and cryptanalytic …

Cryptographic hashing from strong one-way functions (or: One-way product functions and their applications)

J Holmgren, A Lombardi - 2018 IEEE 59th annual symposium …, 2018 - ieeexplore.ieee.org
Cryptographically secure hash functions are a fundamental building block in cryptography.
Some of … In their most general form, hash functions can be modeled as “random oracles” [3], …

A review of collisions in cryptographic hash function used in digital forensic tools

ZE Rasjid, B Soewito, G Witjaksono… - Procedia computer …, 2017 - Elsevier
Cryptographic hash function is a function that converts a message of any length to a data of
fixed length. The purpose of cryptographic hash … (Message Digest) hashing function to proof …