Výsledky vyhledávání - Hash function computation
-
1
In-Memory Computation Based Mapping of Keccak-f Hash Function
ISSN: 2673-3013, 2673-3013Vydáno: Frontiers Media S.A 16.03.2022Vydáno v Frontiers in nanotechnology (16.03.2022)“…Cryptographic hash functions play a central role in data security for applications such as message authentication, data verification, and detecting malicious or illegal modification of data…”
Získat plný text
Journal Article -
2
Parallelizing message schedules to accelerate the computations of hash functions
ISSN: 2190-8508, 2190-8516Vydáno: Berlin/Heidelberg Springer-Verlag 01.11.2012Vydáno v Journal of cryptographic engineering (01.11.2012)“…This paper describes an algorithm for accelerating the computations of Davies–Meyer based hash functions…”
Získat plný text
Journal Article -
3
Coupled map lattice based hash function with collision resistance in single-iteration computation
ISSN: 0020-0255, 1872-6291Vydáno: Elsevier Inc 15.07.2012Vydáno v Information sciences (15.07.2012)“…A new hash function based on a coupled chaotic map lattice is proposed. By combining floating-point chaotic computations with algebraic operations as well…”
Získat plný text
Journal Article -
4
Quantum Hash function and its application to privacy amplification in quantum key distribution, pseudo-random number generation and image encryption
ISSN: 2045-2322, 2045-2322Vydáno: London Nature Publishing Group UK 29.01.2016Vydáno v Scientific reports (29.01.2016)“… In this paper, we investigate the capability of quantum Hash function, which can be constructed by subtly modifying quantum walks, a famous quantum computation model…”
Získat plný text
Journal Article -
5
Simple hash function using discrete-time quantum walks
ISSN: 1570-0755, 1573-1332Vydáno: New York Springer US 01.08.2018Vydáno v Quantum information processing (01.08.2018)“… In this paper, inspired by quantum computation, we present a new hash function by introducing alternate single-qubit coin operators into discrete-time quantum walk…”
Získat plný text
Journal Article -
6
AUTOMATIC DESIGN OF NONCRYPTOGRAPHIC HASH FUNCTIONS USING GENETIC PROGRAMMING
ISSN: 0824-7935, 1467-8640Vydáno: Hoboken Blackwell Publishing Ltd 01.11.2014Vydáno v Computational intelligence (01.11.2014)“…Noncryptographic hash functions have an immense number of important practical applications owing to their powerful search properties…”
Získat plný text
Journal Article -
7
Toward more efficient locality‐sensitive hashing via constructing novel hash function cluster
ISSN: 1532-0626, 1532-0634Vydáno: Hoboken Wiley Subscription Services, Inc 25.10.2021Vydáno v Concurrency and computation (25.10.2021)“…; We innovatively integrate the maximum entropy principle into the distribution estimation algorithm to construct a novel hash function cluster method, also incorporate bootstrap aggregating…”
Získat plný text
Journal Article -
8
Certificateless Proxy Signcryption in the Standard Model for a UAV Network
ISSN: 2327-4662, 2327-4662Vydáno: Piscataway IEEE 15.08.2022Vydáno v IEEE internet of things journal (15.08.2022)“…As we all know, the random oracle model (ROM) is a simulation of the hash function and cannot replace the actual computation of hash function and the public-key…”
Získat plný text
Journal Article -
9
Supervised Adaptive Similarity Matrix Hashing
ISSN: 1057-7149, 1941-0042, 1941-0042Vydáno: United States IEEE 01.01.2022Vydáno v IEEE transactions on image processing (01.01.2022)“…Compact hash codes can facilitate large-scale multimedia retrieval, significantly reducing storage and computation…”
Získat plný text
Journal Article -
10
Monolith: Circuit-Friendly Hash Functions with New Nonlinear Layers for Fast and Constant-Time Implementations
ISSN: 2519-173X, 2519-173XVydáno: Ruhr-Universität Bochum 06.09.2024Vydáno v IACR Transactions on Symmetric Cryptology (06.09.2024)“…Hash functions are a crucial component in incrementally verifiable computation (IVC) protocols and applications…”
Získat plný text
Journal Article -
11
One-time password authentication based on QR code and hash chain
ISSN: 2520-8438, 2520-8446Vydáno: Cham Springer International Publishing 01.09.2025Vydáno v Iran Journal of Computer Science (Online) (01.09.2025)“… This challenge is a random path within an n -dimensional hypercube, where each dimension is associated with a distinct cryptographic hash function…”
Získat plný text
Journal Article -
12
The parallel computation in one-way hash function designing
ISBN: 9781424479573, 1424479576ISSN: 2159-6026Vydáno: IEEE 01.08.2010Vydáno v 2010 International Conference on Computer, Mechatronics, Control and Electronic Engineering (01.08.2010)“… By analyzing the difference between parallel computation on different platforms and classifying one-way hash functions on application basis, the possibility and method of parallel one-way hash…”
Získat plný text
Konferenční příspěvek -
13
Scalable, Fast, and Low-Memory Table Lookups for Network Applications With One CRC-8
ISSN: 2643-3303Vydáno: IEEE 28.10.2024Vydáno v Proceedings - International Conference on Network Protocols (28.10.2024)“… One limitation of existing fast network lookup algorithms is that they require multiple independent and uniform hash functions, which cost high computation time and might not be available on existing…”
Získat plný text
Konferenční příspěvek -
14
Unsupervised Deep Hashing with Similarity-Adaptive and Discrete Optimization
ISSN: 0162-8828, 1939-3539, 2160-9292, 1939-3539Vydáno: United States IEEE 01.12.2018Vydáno v IEEE transactions on pattern analysis and machine intelligence (01.12.2018)“…Recent vision and learning studies show that learning compact hash codes can facilitate massive data processing with significantly reduced storage and computation…”
Získat plný text
Journal Article -
15
Hash Functions and GPU Algorithm of Infinite Grid Method for Contact Search
ISSN: 1392-124X, 2335-884XVydáno: Kaunas University of Technology 26.03.2022Vydáno v Information technology and control (26.03.2022)“…The paper presents the memory-saving GPU algorithm of the infinite grid method with various hash functions for contact search in discrete element computations…”
Získat plný text
Journal Article -
16
Novel high throughput implementation of SHA-256 hash function through pre-computation technique
Vydáno: IEEE 01.12.2005Vydáno v 2005 12th IEEE International Conference on Electronics, Circuits and Systems (01.12.2005)“… Comparing to conventional pipelined implementations of SHA-256 hash function the applied pre-computation technique leads to about 30…”
Získat plný text
Konferenční příspěvek -
17
Quantum search for scaled hash function preimages
ISSN: 1570-0755, 1573-1332Vydáno: New York Springer US 01.05.2021Vydáno v Quantum information processing (01.05.2021)“…We present the implementation of Grover’s algorithm in a quantum simulator to perform a quantum search for preimages of two scaled hash functions, whose design only uses modular addition, word rotation and bitwise exclusive…”
Získat plný text
Journal Article -
18
ASIC-Resistance of Multi-Hash Proof-of-Work Mechanisms for Blockchain Consensus Protocols
ISSN: 2169-3536, 2169-3536Vydáno: Piscataway IEEE 2018Vydáno v IEEE access (2018)“… Employing multiple hash functions in the PoW…”
Získat plný text
Journal Article -
19
A flexible method to defend against computationally resourceful miners in blockchain proof of work
ISSN: 0020-0255, 1872-6291Vydáno: Elsevier Inc 01.01.2020Vydáno v Information sciences (01.01.2020)“… is that blockchain’s decentralization relies on consensus protocols, such as proof of work (PoW). However, computation systems, such as application specific integrated circuit (ASIC…”
Získat plný text
Journal Article -
20
Trusted Codon Fingerprint: A Streamlined Platform for Deep and Reversible Bacterial Cell Labeling
ISSN: 2161-5063, 2161-5063Vydáno: United States 17.10.2025Vydáno v ACS synthetic biology (17.10.2025)“…The proliferation of artificially engineered cells, driven by advances in synthetic biology, underscores the urgent need to efficiently and precisely tag or…”
Zjistit podrobnosti o přístupu
Journal Article

