Search Results - Hash function computation

Refine Results
  1. 1

    In-Memory Computation Based Mapping of Keccak-f Hash Function by Kingra, Sandeep Kaur, Parmar, Vivek, Suri, Manan

    ISSN: 2673-3013, 2673-3013
    Published: Frontiers Media S.A 16.03.2022
    Published in Frontiers in nanotechnology (16.03.2022)
    “…Cryptographic hash functions play a central role in data security for applications such as message authentication, data verification, and detecting malicious or illegal modification of data…”
    Get full text
    Journal Article
  2. 2

    Parallelizing message schedules to accelerate the computations of hash functions by Gueron, Shay, Krasnov, Vlad

    ISSN: 2190-8508, 2190-8516
    Published: Berlin/Heidelberg Springer-Verlag 01.11.2012
    Published in Journal of cryptographic engineering (01.11.2012)
    “…This paper describes an algorithm for accelerating the computations of Davies–Meyer based hash functions…”
    Get full text
    Journal Article
  3. 3

    Coupled map lattice based hash function with collision resistance in single-iteration computation by Wang, Shihong, Hu, Gang

    ISSN: 0020-0255, 1872-6291
    Published: Elsevier Inc 15.07.2012
    Published in Information sciences (15.07.2012)
    “…A new hash function based on a coupled chaotic map lattice is proposed. By combining floating-point chaotic computations with algebraic operations as well…”
    Get full text
    Journal Article
  4. 4

    Quantum Hash function and its application to privacy amplification in quantum key distribution, pseudo-random number generation and image encryption by Yang, Yu-Guang, Xu, Peng, Yang, Rui, Zhou, Yi-Hua, Shi, Wei-Min

    ISSN: 2045-2322, 2045-2322
    Published: London Nature Publishing Group UK 29.01.2016
    Published in Scientific reports (29.01.2016)
    “… In this paper, we investigate the capability of quantum Hash function, which can be constructed by subtly modifying quantum walks, a famous quantum computation model…”
    Get full text
    Journal Article
  5. 5

    Simple hash function using discrete-time quantum walks by Yang, Yu-Guang, Bi, Jing-Lin, Chen, Xiu-Bo, Yuan, Zheng, Zhou, Yi-Hua, Shi, Wei-Min

    ISSN: 1570-0755, 1573-1332
    Published: New York Springer US 01.08.2018
    Published in Quantum information processing (01.08.2018)
    “… In this paper, inspired by quantum computation, we present a new hash function by introducing alternate single-qubit coin operators into discrete-time quantum walk…”
    Get full text
    Journal Article
  6. 6

    AUTOMATIC DESIGN OF NONCRYPTOGRAPHIC HASH FUNCTIONS USING GENETIC PROGRAMMING by Estébanez, César, Saez, Yago, Recio, Gustavo, Isasi, Pedro

    ISSN: 0824-7935, 1467-8640
    Published: Hoboken Blackwell Publishing Ltd 01.11.2014
    Published in Computational intelligence (01.11.2014)
    “…Noncryptographic hash functions have an immense number of important practical applications owing to their powerful search properties…”
    Get full text
    Journal Article
  7. 7

    Toward more efficient locality‐sensitive hashing via constructing novel hash function cluster by Zhang, Shi, Huang, Jin, Xiao, Ruliang, Du, Xin, Gong, Ping, Lin, Xinhong

    ISSN: 1532-0626, 1532-0634
    Published: Hoboken Wiley Subscription Services, Inc 25.10.2021
    Published in Concurrency and computation (25.10.2021)
    “…; We innovatively integrate the maximum entropy principle into the distribution estimation algorithm to construct a novel hash function cluster method, also incorporate bootstrap aggregating…”
    Get full text
    Journal Article
  8. 8

    Certificateless Proxy Signcryption in the Standard Model for a UAV Network by Qu, Yunyun, Zeng, Jiwen

    ISSN: 2327-4662, 2327-4662
    Published: Piscataway IEEE 15.08.2022
    Published in IEEE internet of things journal (15.08.2022)
    “…As we all know, the random oracle model (ROM) is a simulation of the hash function and cannot replace the actual computation of hash function and the public-key…”
    Get full text
    Journal Article
  9. 9

    Supervised Adaptive Similarity Matrix Hashing by Shi, Yang, Nie, Xiushan, Liu, Xingbo, Zou, Li, Yin, Yilong

    ISSN: 1057-7149, 1941-0042, 1941-0042
    Published: United States IEEE 01.01.2022
    Published in IEEE transactions on image processing (01.01.2022)
    “…Compact hash codes can facilitate large-scale multimedia retrieval, significantly reducing storage and computation…”
    Get full text
    Journal Article
  10. 10

    Monolith: Circuit-Friendly Hash Functions with New Nonlinear Layers for Fast and Constant-Time Implementations by Grassi, Lorenzo, Khovratovich, Dmitry, Lüftenegger, Reinhard, Rechberger, Christian, Schofnegger, Markus, Walch, Roman

    ISSN: 2519-173X, 2519-173X
    Published: Ruhr-Universität Bochum 06.09.2024
    Published in IACR Transactions on Symmetric Cryptology (06.09.2024)
    “…Hash functions are a crucial component in incrementally verifiable computation (IVC) protocols and applications…”
    Get full text
    Journal Article
  11. 11

    One-time password authentication based on QR code and hash chain by Mahansaria, Divyans, Roy, Uttam Kumar

    ISSN: 2520-8438, 2520-8446
    Published: Cham Springer International Publishing 01.09.2025
    Published in Iran Journal of Computer Science (Online) (01.09.2025)
    “… This challenge is a random path within an n -dimensional hypercube, where each dimension is associated with a distinct cryptographic hash function…”
    Get full text
    Journal Article
  12. 12

    The parallel computation in one-way hash function designing by Peiyue Li, Yongxin Sui, Huaijiang Yang

    ISBN: 9781424479573, 1424479576
    ISSN: 2159-6026
    Published: IEEE 01.08.2010
    “… By analyzing the difference between parallel computation on different platforms and classifying one-way hash functions on application basis, the possibility and method of parallel one-way hash…”
    Get full text
    Conference Proceeding
  13. 13

    Scalable, Fast, and Low-Memory Table Lookups for Network Applications With One CRC-8 by Liu, Yi, Shi, Shouqian, Zhou, Ruilin, Gan, Yuhang, Qian, Chen

    ISSN: 2643-3303
    Published: IEEE 28.10.2024
    “… One limitation of existing fast network lookup algorithms is that they require multiple independent and uniform hash functions, which cost high computation time and might not be available on existing…”
    Get full text
    Conference Proceeding
  14. 14

    Unsupervised Deep Hashing with Similarity-Adaptive and Discrete Optimization by Shen, Fumin, Xu, Yan, Liu, Li, Yang, Yang, Huang, Zi, Shen, Heng Tao

    ISSN: 0162-8828, 1939-3539, 2160-9292, 1939-3539
    Published: United States IEEE 01.12.2018
    “…Recent vision and learning studies show that learning compact hash codes can facilitate massive data processing with significantly reduced storage and computation…”
    Get full text
    Journal Article
  15. 15

    Hash Functions and GPU Algorithm of Infinite Grid Method for Contact Search by Pacevič, Ruslan, Kačeniauskas, Arnas

    ISSN: 1392-124X, 2335-884X
    Published: Kaunas University of Technology 26.03.2022
    Published in Information technology and control (26.03.2022)
    “…The paper presents the memory-saving GPU algorithm of the infinite grid method with various hash functions for contact search in discrete element computations…”
    Get full text
    Journal Article
  16. 16

    Novel high throughput implementation of SHA-256 hash function through pre-computation technique by Michail, H., Milidonis, A., Kakarountas, A., Goutis, C.

    Published: IEEE 01.12.2005
    “… Comparing to conventional pipelined implementations of SHA-256 hash function the applied pre-computation technique leads to about 30…”
    Get full text
    Conference Proceeding
  17. 17

    Quantum search for scaled hash function preimages by Ramos-Calderer, Sergi, Bellini, Emanuele, Latorre, José I., Manzano, Marc, Mateu, Victor

    ISSN: 1570-0755, 1573-1332
    Published: New York Springer US 01.05.2021
    Published in Quantum information processing (01.05.2021)
    “…We present the implementation of Grover’s algorithm in a quantum simulator to perform a quantum search for preimages of two scaled hash functions, whose design only uses modular addition, word rotation and bitwise exclusive…”
    Get full text
    Journal Article
  18. 18

    ASIC-Resistance of Multi-Hash Proof-of-Work Mechanisms for Blockchain Consensus Protocols by Cho, Hyungmin

    ISSN: 2169-3536, 2169-3536
    Published: Piscataway IEEE 2018
    Published in IEEE access (2018)
    “… Employing multiple hash functions in the PoW…”
    Get full text
    Journal Article
  19. 19

    A flexible method to defend against computationally resourceful miners in blockchain proof of work by Ren, Wei, Hu, Jingjing, Zhu, Tianqing, Ren, Yi, Choo, Kim-Kwang Raymond

    ISSN: 0020-0255, 1872-6291
    Published: Elsevier Inc 01.01.2020
    Published in Information sciences (01.01.2020)
    “… is that blockchain’s decentralization relies on consensus protocols, such as proof of work (PoW). However, computation systems, such as application specific integrated circuit (ASIC…”
    Get full text
    Journal Article
  20. 20

    Trusted Codon Fingerprint: A Streamlined Platform for Deep and Reversible Bacterial Cell Labeling by Wang, Zhaoguan, Cui, Jingsong, Tan, Gaoxu, Cao, Gaili, Zhang, Jie, Qi, Hao

    ISSN: 2161-5063, 2161-5063
    Published: United States 17.10.2025
    Published in ACS synthetic biology (17.10.2025)
    “…The proliferation of artificially engineered cells, driven by advances in synthetic biology, underscores the urgent need to efficiently and precisely tag or…”
    Get more information
    Journal Article