Lightweight cryptographic hash functions: Design trends, comparative study, and future directions

S Windarta, S Suryadi, K Ramli, B Pranggono… - Ieee …, 2022 - ieeexplore.ieee.org
cryptographic hash function algorithms. In this paper, we discuss advanced … cryptographic
hash functions for highly constrained devices, categorize design trends, analyze cryptographic

[PDF][PDF] Performance analysis of cryptographic hash functions suitable for use in blockchain

A Kuznetsov, I Oleshko, V Tymchenko… - International Journal of …, 2021 - academia.edu
… been no extensive analysis of hash functions, … analysis of cryptographic hash functions that
can be used in blockchain systems. The most common and applicable cryptographic hashing

Design and security analysis of two robust keyed hash functions based on chaotic neural networks

N Abdoun, S El Assad, O Deforges, R Assaf… - Journal of Ambient …, 2020 - Springer
designed, implemented, and analyzed the performance, in terms of security and speed, of
two proposed keyed Chaotic Neural Network (CNN) hash functions … The first hash function’s …

Design and analysis of new version of cryptographic hash function based on improved chaotic maps with induced DNA sequences

SMS Eldin, AAA El-Latif, SA Chelloug, M Ahmad… - IEEE …, 2023 - ieeexplore.ieee.org
… on the increasing hashing algorithm security. This paper proposes to present a modified
SHA-256 like hash algorithm by exploring the design principles of the two hash schemes (SHA-…

[PDF][PDF] A comparative study of hash algorithms in cryptography

PP Pittalia - International Journal of Computer Science and Mobile …, 2019 - academia.edu
… This property makes this hash functions a one-way function, it is not possible to deduce
the input for a given output. Cryptographic hash functions have another property that it is very …

An analysis and evaluation of lightweight hash functions for blockchain-based IoT devices

S Abed, R Jaffal, BJ Mohd, M Al-Shayeji - Cluster computing, 2021 - Springer
… In this study, we present a literature review on the common hash functions used in
blockchain-based … We analyze these hash functions and determine the best hash function in each …

Sponge based lightweight cryptographic hash functions for IoT applications

DN Gupta, R Kumar - 2021 International Conference on …, 2021 - ieeexplore.ieee.org
… and Tolga Yalcin from Department of Cryptography Institute of Applied Mathematics, METU
Ankara (Turkey) present their work based on cryptographic hash function “KECCAK”. The …

On the use of chaotic iterations to design keyed hash function

Z Lin, C Guyeux, S Yu, Q Wang, S Cai - Cluster Computing, 2019 - Springer
… to combine pseudorandom number generation and hash functions using CIs. After doing …
hash functions. More precisely, we will apply chaotic iterations on existing hash functions, …

Cryptographic and parallel hash function based on cross coupled map lattices suitable for multimedia communication security

Y Li, G Ge - Multimedia Tools and Applications, 2019 - Springer
… present the design of the cryptographic and parallel hash algorithm based on the cross
coupled map lattices in detail. We evaluate the performance of the proposed hash algorithm in …

Does Fiat-Shamir require a cryptographic hash function?

Y Chen, A Lombardi, F Ma, W Quach - Annual International Cryptology …, 2021 - Springer
… simple and non-cryptographic hash functions such as sum-mod-… in which a cryptographic
hash function is provably necessary … role of the hash function in the Fiat-Shamir transformation. …