Search Results - Hash function computation
-
1
In-Memory Computation Based Mapping of Keccak-f Hash Function
ISSN: 2673-3013, 2673-3013Published: Frontiers Media S.A 16.03.2022Published in Frontiers in nanotechnology (16.03.2022)“…Cryptographic hash functions play a central role in data security for applications such as message authentication, data verification, and detecting malicious or illegal modification of data…”
Get full text
Journal Article -
2
Parallelizing message schedules to accelerate the computations of hash functions
ISSN: 2190-8508, 2190-8516Published: Berlin/Heidelberg Springer-Verlag 01.11.2012Published in Journal of cryptographic engineering (01.11.2012)“…This paper describes an algorithm for accelerating the computations of Davies–Meyer based hash functions…”
Get full text
Journal Article -
3
Coupled map lattice based hash function with collision resistance in single-iteration computation
ISSN: 0020-0255, 1872-6291Published: Elsevier Inc 15.07.2012Published in Information sciences (15.07.2012)“…A new hash function based on a coupled chaotic map lattice is proposed. By combining floating-point chaotic computations with algebraic operations as well…”
Get full text
Journal Article -
4
Quantum Hash function and its application to privacy amplification in quantum key distribution, pseudo-random number generation and image encryption
ISSN: 2045-2322, 2045-2322Published: London Nature Publishing Group UK 29.01.2016Published in Scientific reports (29.01.2016)“… In this paper, we investigate the capability of quantum Hash function, which can be constructed by subtly modifying quantum walks, a famous quantum computation model…”
Get full text
Journal Article -
5
Simple hash function using discrete-time quantum walks
ISSN: 1570-0755, 1573-1332Published: New York Springer US 01.08.2018Published in Quantum information processing (01.08.2018)“… In this paper, inspired by quantum computation, we present a new hash function by introducing alternate single-qubit coin operators into discrete-time quantum walk…”
Get full text
Journal Article -
6
AUTOMATIC DESIGN OF NONCRYPTOGRAPHIC HASH FUNCTIONS USING GENETIC PROGRAMMING
ISSN: 0824-7935, 1467-8640Published: Hoboken Blackwell Publishing Ltd 01.11.2014Published in Computational intelligence (01.11.2014)“…Noncryptographic hash functions have an immense number of important practical applications owing to their powerful search properties…”
Get full text
Journal Article -
7
Toward more efficient locality‐sensitive hashing via constructing novel hash function cluster
ISSN: 1532-0626, 1532-0634Published: Hoboken Wiley Subscription Services, Inc 25.10.2021Published in Concurrency and computation (25.10.2021)“…; We innovatively integrate the maximum entropy principle into the distribution estimation algorithm to construct a novel hash function cluster method, also incorporate bootstrap aggregating…”
Get full text
Journal Article -
8
Certificateless Proxy Signcryption in the Standard Model for a UAV Network
ISSN: 2327-4662, 2327-4662Published: Piscataway IEEE 15.08.2022Published in IEEE internet of things journal (15.08.2022)“…As we all know, the random oracle model (ROM) is a simulation of the hash function and cannot replace the actual computation of hash function and the public-key…”
Get full text
Journal Article -
9
Supervised Adaptive Similarity Matrix Hashing
ISSN: 1057-7149, 1941-0042, 1941-0042Published: United States IEEE 01.01.2022Published in IEEE transactions on image processing (01.01.2022)“…Compact hash codes can facilitate large-scale multimedia retrieval, significantly reducing storage and computation…”
Get full text
Journal Article -
10
Monolith: Circuit-Friendly Hash Functions with New Nonlinear Layers for Fast and Constant-Time Implementations
ISSN: 2519-173X, 2519-173XPublished: Ruhr-Universität Bochum 06.09.2024Published in IACR Transactions on Symmetric Cryptology (06.09.2024)“…Hash functions are a crucial component in incrementally verifiable computation (IVC) protocols and applications…”
Get full text
Journal Article -
11
One-time password authentication based on QR code and hash chain
ISSN: 2520-8438, 2520-8446Published: Cham Springer International Publishing 01.09.2025Published in Iran Journal of Computer Science (Online) (01.09.2025)“… This challenge is a random path within an n -dimensional hypercube, where each dimension is associated with a distinct cryptographic hash function…”
Get full text
Journal Article -
12
The parallel computation in one-way hash function designing
ISBN: 9781424479573, 1424479576ISSN: 2159-6026Published: IEEE 01.08.2010Published in 2010 International Conference on Computer, Mechatronics, Control and Electronic Engineering (01.08.2010)“… By analyzing the difference between parallel computation on different platforms and classifying one-way hash functions on application basis, the possibility and method of parallel one-way hash…”
Get full text
Conference Proceeding -
13
Scalable, Fast, and Low-Memory Table Lookups for Network Applications With One CRC-8
ISSN: 2643-3303Published: IEEE 28.10.2024Published in Proceedings - International Conference on Network Protocols (28.10.2024)“… One limitation of existing fast network lookup algorithms is that they require multiple independent and uniform hash functions, which cost high computation time and might not be available on existing…”
Get full text
Conference Proceeding -
14
Unsupervised Deep Hashing with Similarity-Adaptive and Discrete Optimization
ISSN: 0162-8828, 1939-3539, 2160-9292, 1939-3539Published: United States IEEE 01.12.2018Published in IEEE transactions on pattern analysis and machine intelligence (01.12.2018)“…Recent vision and learning studies show that learning compact hash codes can facilitate massive data processing with significantly reduced storage and computation…”
Get full text
Journal Article -
15
Hash Functions and GPU Algorithm of Infinite Grid Method for Contact Search
ISSN: 1392-124X, 2335-884XPublished: Kaunas University of Technology 26.03.2022Published in Information technology and control (26.03.2022)“…The paper presents the memory-saving GPU algorithm of the infinite grid method with various hash functions for contact search in discrete element computations…”
Get full text
Journal Article -
16
Novel high throughput implementation of SHA-256 hash function through pre-computation technique
Published: IEEE 01.12.2005Published in 2005 12th IEEE International Conference on Electronics, Circuits and Systems (01.12.2005)“… Comparing to conventional pipelined implementations of SHA-256 hash function the applied pre-computation technique leads to about 30…”
Get full text
Conference Proceeding -
17
Quantum search for scaled hash function preimages
ISSN: 1570-0755, 1573-1332Published: New York Springer US 01.05.2021Published in Quantum information processing (01.05.2021)“…We present the implementation of Grover’s algorithm in a quantum simulator to perform a quantum search for preimages of two scaled hash functions, whose design only uses modular addition, word rotation and bitwise exclusive…”
Get full text
Journal Article -
18
ASIC-Resistance of Multi-Hash Proof-of-Work Mechanisms for Blockchain Consensus Protocols
ISSN: 2169-3536, 2169-3536Published: Piscataway IEEE 2018Published in IEEE access (2018)“… Employing multiple hash functions in the PoW…”
Get full text
Journal Article -
19
A flexible method to defend against computationally resourceful miners in blockchain proof of work
ISSN: 0020-0255, 1872-6291Published: Elsevier Inc 01.01.2020Published in Information sciences (01.01.2020)“… is that blockchain’s decentralization relies on consensus protocols, such as proof of work (PoW). However, computation systems, such as application specific integrated circuit (ASIC…”
Get full text
Journal Article -
20
Trusted Codon Fingerprint: A Streamlined Platform for Deep and Reversible Bacterial Cell Labeling
ISSN: 2161-5063, 2161-5063Published: United States 17.10.2025Published in ACS synthetic biology (17.10.2025)“…The proliferation of artificially engineered cells, driven by advances in synthetic biology, underscores the urgent need to efficiently and precisely tag or…”
Get more information
Journal Article

