R Sobti, G Geetha - International Journal of Computer Science Issues …, 2012 - Citeseer
… However if it satisfies some additional requirements (as detailed further), then it can be used for cryptographic applications and then known as CryptographicHashfunctions. … Block …
… In this thesis cryptographichashfunctions will be studied … Chapter 2 contains an overview of cryptographichashfunctions. … of hashfunctions, and an extensive taxonomy of attacks on …
DR Stinson - Designs, Codes and Cryptography, 2006 - Springer
… Security of hashfunctions has been considered in many papers, but it is still not completely … for a cryptographichashfunction to be “secure”. The notion of a secure hashfunction is …
… Our example above could not be considered a cryptographichashfunction because it would be trivial to construct two inputs to this hashfunction that would create the same output, for …
… cryptographichashfunctions security and design. We first discuss the various hashfunctions … of how (and why) hashfunctions evolved over the years giving raise to the current diverse …
… of a random function. The main focus of this work is on collision resistant hashfunctions (CRH)… which the function has the same output.However, we will also consider universal one-way …
… When the hashfunction is constructed from one of Pizer’s … Constructing our hashfunctions from optimal expander graphs … these hashfunctions, and we implement our hashfunction …
… For a cryptographichashfunction to be of any use in cryptography, it has to satisfy certain conditions. It is difficult to state all these conditions, however, since hashfunctions are used in …
J Tchórzewski, A Jakóbik - Journal of Telecommunications and …, 2019 - bibliotekanauki.pl
… theoretical introduction to the cryptographichashfunction theory and a statistical experimental analysis of selected hashfunctions. The definition of hashfunctions, differences between …