Search results
From MaRDI portal
- analysis of one kind of chaos-based hash function 2012-04-30 Paper Improving the security of a parallel keyed hash function based on chaotic maps 2012-03-28...10 bytes (13 words) - 02:07, 25 September 2023
- high nonlinearity 2021-04-19 Paper Design and Analysis on a Parallel Chaos-Based Hash Function 2020-12-03 Paper A pseudorandom number generator based on...10 bytes (14 words) - 12:37, 28 January 2024
- \(n\)-dimensional hyperchaotic map model with application in a keyed parallel hash function 2024-05-14 Paper A strong key expansion algorithm based on nondegenerate...10 bytes (13 words) - 08:46, 7 October 2023
- application in a keyed parallel hash function 2024-05-14 Paper Constructing strong S-box by 2D chaotic map with application to irreversible parallel key expansion...10 bytes (13 words) - 20:28, 26 December 2023
- ``Analysis and improvement of a chaos-based hash function construction 2011-10-13 Paper Parallel keyed hash function construction based on chaotic maps 2011-09-27...10 bytes (13 words) - 15:06, 6 October 2023
- model with subexponential claims 2015-07-31 Paper A more secure parallel keyed hash function based on chaotic neural network 2011-07-13 Paper...10 bytes (13 words) - 01:54, 25 September 2023
- Optimization of Tree Modes for Parallel Hash Functions: A Case Study 2018-06-27 Paper Hamming distances from a function to all codewords of a generalized...10 bytes (14 words) - 16:43, 6 October 2023
- Paper A New Dedicated 256-Bit Hash Function: FORK-256 2009-04-02 Paper Preimage Attack on the Parallel FFT-Hashing Function 2009-03-06 Paper Improved Indifferentiability...10 bytes (13 words) - 17:50, 24 September 2023
- Paper A New Double-Block-Length Hash Function Using Feistel Structure 2009-06-25 Paper A New Dedicated 256-Bit Hash Function: FORK-256 2009-04-02 Paper Preimage...10 bytes (13 words) - 21:41, 10 December 2023
- Paper A New Double-Block-Length Hash Function Using Feistel Structure 2009-06-25 Paper A New Dedicated 256-Bit Hash Function: FORK-256 2009-04-02 Paper Preimage...10 bytes (13 words) - 21:41, 10 December 2023
- Paper A New Dedicated 256-Bit Hash Function: FORK-256 2009-04-02 Paper Preimage Attack on the Parallel FFT-Hashing Function 2009-03-06 Paper Provable Security...10 bytes (14 words) - 18:22, 9 December 2023
- Indistinguishability 2008-04-11 Paper RC4-Hash: A New Hash Function Based on RC4 2008-04-11 Paper Towards Optimal Double-Length Hash Functions 2008-03-17 Paper Selected...10 bytes (13 words) - 01:01, 7 October 2023
- on the reduced-round Grøstl-0 hash function 2014-03-17 Paper Challenging the increased resistance of regular hash functions against birthday attacks 2013-01-17...10 bytes (15 words) - 07:53, 6 October 2023
- properties 2015-09-17 Paper NORX: Parallel and scalable AEAD 2015-07-27 Paper The hash function \texttt{BLAKE} 2014-12-15 Paper SipHash: a fast short-input PRF 2014-08-20...10 bytes (15 words) - 02:02, 25 September 2023
- 2018-02-09 Paper Chaotic hash function based on circular shifts with variable parameters 2017-10-18 Paper Chaotic hash function based on the dynamic S-box...10 bytes (13 words) - 01:50, 11 December 2023
- Generic attacks on hash combiners 2020-06-15 Paper Improved indifferentiability security bound for the prefix-free Merkle-Damgård hash function 2019-10-31 Paper...10 bytes (14 words) - 10:26, 7 October 2023
- (Block-Wise) Universal Hash Functions 2017-08-08 Paper Computing Partial Walsh Transform From the Algebraic Normal Form of a Boolean Function 2017-08-08 Paper...10 bytes (15 words) - 15:43, 10 December 2023
- key-length extension: exact bounds and multi-user security 2016-11-30 Paper Hash-Function Based PRFs: AMAC and Its Multi-User Security 2016-09-09 Paper Provably...10 bytes (13 words) - 17:20, 6 October 2023
- Paper Full Cryptanalysis of LPS and Morgenstern Hash Functions 2008-11-20 Paper On the Salsa20 Core Function 2008-09-18 Paper Experiments on the Multiple...10 bytes (15 words) - 06:07, 9 December 2023
- Ciphers and Hash Functions 2015-12-04 Paper LHash: a lightweight hash function 2015-12-02 Paper Cryptanalysis of the Round-Reduced GOST Hash Function 2015-12-02...10 bytes (13 words) - 11:29, 28 January 2024