A Kuznetsov, I Oleshko, V Tymchenko… - International Journal of …, 2021 - academia.edu
… been no extensive analysis of hashfunctions, … analysis of cryptographichashfunctions that can be used in blockchain systems. The most common and applicable cryptographichashing …
… designed, implemented, and analyzed the performance, in terms of security and speed, of two proposed keyed Chaotic Neural Network (CNN) hashfunctions … The first hashfunction’s …
… on the increasing hashingalgorithm security. This paper proposes to present a modified SHA-256 like hashalgorithm by exploring the design principles of the two hash schemes (SHA-…
PP Pittalia - International Journal of Computer Science and Mobile …, 2019 - academia.edu
… This property makes this hashfunctions a one-way function, it is not possible to deduce the input for a given output. Cryptographichashfunctions have another property that it is very …
S Abed, R Jaffal, BJ Mohd, M Al-Shayeji - Cluster computing, 2021 - Springer
… In this study, we present a literature review on the common hashfunctions used in blockchain-based … We analyze these hashfunctions and determine the best hashfunction in each …
DN Gupta, R Kumar - 2021 International Conference on …, 2021 - ieeexplore.ieee.org
… and Tolga Yalcin from Department of Cryptography Institute of Applied Mathematics, METU Ankara (Turkey) present their work based on cryptographichashfunction “KECCAK”. The …
… to combine pseudorandom number generation and hashfunctions using CIs. After doing … hashfunctions. More precisely, we will apply chaotic iterations on existing hashfunctions, …
Y Li, G Ge - Multimedia Tools and Applications, 2019 - Springer
… present the design of the cryptographic and parallel hashalgorithm based on the cross coupled map lattices in detail. We evaluate the performance of the proposed hashalgorithm in …
… simple and non-cryptographichashfunctions such as sum-mod-… in which a cryptographic hashfunction is provably necessary … role of the hashfunction in the Fiat-Shamir transformation. …