[PDF][PDF] Performance analysis of cryptographic hash functions suitable for use in blockchain

A Kuznetsov, I Oleshko, V Tymchenko… - International Journal of …, 2021 - academia.edu
… Our studies also include the iterative cryptographic hash function "Kupyna". This function
is adopted as the national standard of Ukraine DSTU 7564: 2014 [29]. This research will be …

Lightweight cryptographic hash functions: Design trends, comparative study, and future directions

S Windarta, S Suryadi, K Ramli, B Pranggono… - Ieee …, 2022 - ieeexplore.ieee.org
cryptographic hash function algorithms. In this paper, we discuss advanced lightweight
cryptographic hash functions … design trends, analyze cryptographic aspects and cryptanalytic …

Does Fiat-Shamir require a cryptographic hash function?

Y Chen, A Lombardi, F Ma, W Quach - Annual International Cryptology …, 2021 - Springer
… Shamir truly requires a cryptographic hash function. Perhaps … simple and non-cryptographic
hash functions such as sum-… in which a cryptographic hash function is provably necessary …

[PDF][PDF] A comparative study of hash algorithms in cryptography

PP Pittalia - International Journal of Computer Science and Mobile …, 2019 - academia.edu
… This property makes this hash functions a one-way function, it is not possible to deduce
the input for a given output. Cryptographic hash functions have another property that it is very …

[HTML][HTML] Integrity verification for digital Holy Quran verses using cryptographic hash function and compression

M Almazrooie, A Samsudin, AAA Gutub… - Journal of King Saud …, 2020 - Elsevier
… The main task of the cryptographic hash function is to assure the … cryptographic hash
functions and generate the hash table of the Holy Quran. SHA256 and RIPEMD160 hash functions

Cryptographic hashing in p4 data planes

D Scholz, A Oeldemann, F Geyer… - 2019 ACM/IEEE …, 2019 - ieeexplore.ieee.org
… We argue for the inclusion of cryptographic hash functions in programmable packet processing
platforms in section III. In section IV we discuss our approaches to extend three different …

Engineering graphical captcha and AES crypto hash functions for secure online authentication

N Kheshaifaty, A Gutub - Journal of Engineering Research, 2023 - kuwaitjournals.org
… This CAPTCHA has many applications in the online security domain which is merged
with encrypted hash function as accommodating advantages of retaining the facility of the …

Faster cryptographic hash function from supersingular isogeny graphs

J Doliskani, GCCF Pereira, PSLM Barreto - … Areas in Cryptography, 2022 - Springer
We propose a variant of the CGL hash algorithm [ 5 ] that is significantly faster than the
original algorithm, and prove that it is preimage and collision resistant. For n = log p \…

The theory of hash functions and random oracles

A Mittelbach, M Fischlin - An Approach to Modern Cryptography, Cham …, 2021 - Springer
hash functions are such a versatile cryptographic primitive is that we expect a cryptographic
hash function … Constructions) we look at how to construct cryptographic hash functions and, …

[PDF][PDF] Preventing multiple accessing attacks via efficient integration of captcha crypto hash functions

N Kheshaifaty, A Gutub - Int. J. Comput. Sci. Netw. Secur.(IJCSNS), 2020 - researchgate.net
… system integrated with crypto hash functions for proper security … system component, and
SHA1 hash function, all combined for … crypto hash functions improved to be in efficient manner. …