Diffusion and statistical analysis of STITCH-256
Hash function is an important cryptographic primitive used in a wide range of applications, for example, for message authentication and in digital signatures. MD 4/5 and SHA-0/1/2 are examples of widely used hash functions, but except for SHA-2 (SHA-224, 256, 384, 512), they were all broken in 2005...
Saved in:
Main Authors: | Jamil N., Mahmod R., Z'aba M.R., Udzir N.I., Zukarnain Z.A. |
---|---|
其他作者: | 36682671900 |
格式: | Article |
出版: |
2023
|
主题: | |
标签: |
添加标签
没有标签, 成为第一个标记此记录!
|
相似书籍
-
STITCH-256: A dedicated cryptographic hash function
由: Jamil N., et al.
出版: (2023) -
An observation of cryptographic properties of 256 one-dimensional cellular automata rules
由: Jamil N., et al.
出版: (2023) -
Pembangunan aturcara berlandaskan algoritma genetik
sebagai kaedah penyelesaian masalah pengagihan frekuensi
sistem komunikasi selular / Fadzil Ahmad, Mohamad Faizal Abd Rahman and Rozan Boudville
由: Ahmad, Fadzil, et al.
出版: (2008) -
The development of hashing indexing technique in case retrieval
由: M.F.M., Mohsin,, et al.
出版: (2015) -
Sponge-Based Parallel Authenticated Encryption With Variable Tag Length and Side-Channel Protection
由: Jimale M.A., et al.
出版: (2024)