Diffusion and statistical analysis of STITCH-256
Hash function is an important cryptographic primitive used in a wide range of applications, for example, for message authentication and in digital signatures. MD 4/5 and SHA-0/1/2 are examples of widely used hash functions, but except for SHA-2 (SHA-224, 256, 384, 512), they were all broken in 2005...
Saved in:
Main Authors: | Jamil N., Mahmod R., Z'aba M.R., Udzir N.I., Zukarnain Z.A. |
---|---|
Other Authors: | 36682671900 |
Format: | Article |
Published: |
2023
|
Subjects: | |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
STITCH-256: A dedicated cryptographic hash function
by: Jamil N., et al.
Published: (2023) -
An observation of cryptographic properties of 256 one-dimensional cellular automata rules
by: Jamil N., et al.
Published: (2023) -
Pembangunan aturcara berlandaskan algoritma genetik
sebagai kaedah penyelesaian masalah pengagihan frekuensi
sistem komunikasi selular / Fadzil Ahmad, Mohamad Faizal Abd Rahman and Rozan Boudville
by: Ahmad, Fadzil, et al.
Published: (2008) -
The development of hashing indexing technique in case retrieval
by: M.F.M., Mohsin,, et al.
Published: (2015) -
Sponge-Based Parallel Authenticated Encryption With Variable Tag Length and Side-Channel Protection
by: Jimale M.A., et al.
Published: (2024)