[PDF][PDF] Analysis and design of cryptographic hash functions

B Preneel - 1993 - Citeseer
… This section aims to illustrate briefly how cryptographic hash functions can be used to protect
the authenticity of information and to improve digital signature schemes. A more detailed …

[PDF][PDF] Analysis and design of cryptographic hash functions

S Indesteege - Katholieke Universiteit Leuven, 2010 - esat.kuleuven.be
… field cryptology and cryptographic hash functions, and introduces … to the design and analysis
of cryptographic hash functions. The … Chapter 2 focuses on cryptographic hash functions. …

[PDF][PDF] Theoretical and experimental analysis of cryptographic hash functions

J Tchórzewski, A Jakóbik - Journal of Telecommunications and …, 2019 - bibliotekanauki.pl
… theoretical introduction to the cryptographic hash function theory and a statistical experimental
analysis of selected hash functions. The definition of hash functions, differences between …

Cryptographic hash functions: Recent design trends and security notions

S Al-Kuwari, JH Davenport, RJ Bradford - Cryptology ePrint Archive, 2011 - eprint.iacr.org
… discuss the design of hash functions as follows. In section 6, we classify hash functions as
keyed … hash functions, this is indeed the most common approach (at least contemporarily) in …

Cryptographic hash functions: cryptanalysis, design and applications

P Gauravaram - 2007 - eprints.qut.edu.au
designing hash functions. This thesis aims at analysing the security of the standard hash
function Cellular Authentication and Voice Encryption Algorithm (CAVE) used for authentication …

[PDF][PDF] Design and analysis of cryptographic hash functions

Ö Küçük - Leuven: Katholieke Universiteit Leuven, 2012 - esat.kuleuven.be
… definition, hash functions play an essential role in a wide … cryptographic hash function. In
this thesis, we approach the problem of the design and analysis of cryptographic hash functions

[PDF][PDF] Performance analysis of cryptographic hash functions suitable for use in blockchain

A Kuznetsov, I Oleshko, V Tymchenko… - International Journal of …, 2021 - academia.edu
… been no extensive analysis of hash functions, … analysis of cryptographic hash functions that
can be used in blockchain systems. The most common and applicable cryptographic hashing

Design and analysis cryptographic hash function for the next generation

YS Her, K Sakurai - Proc. of International Workshop on …, 2002 - catalog.lib.kyushu-u.ac.jp
… In 1990 Rivest proposed the cryptographic hash function MD4. MD4 [1]is a 128-bit hash
function and consists of 3 rounds. … So, It is undesirable to use MD4 as a hash function. MD5 was …

Design and analysis of hash functions

MKR Danda - 2007 - vuir.vu.edu.au
… of the effected hash function with the SHA-2 group of hash functions. This … hash functions,
different types of attacks on the hash functions and structural weaknesses of the hash functions

[PDF][PDF] Cipher and hash function design strategies based on linear and differential cryptanalysis

J Daemen - 1995 - cs.ru.nl
… basic requirement that guides our design strategy of cryptographic hash functions. Still, in
our notion of security with respect to cryptographic hash functions, collision-resistance is more …