Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Aug 31, 2018 · Cloud audit is an effective solution for massive data verification and provides reliable and credible authentication results. High efficiency of ...
A parallel iterative structure and a message padding procedure are proposed to construct a novel parallel lattice hash function (PLHF) and a lattice-based ...
People also ask
What is a secure hash function in information security?
Secure Hash Algorithms, also known as SHA, are a family of cryptographic functions designed to keep data secured. It works by transforming the data using a hash function: an algorithm that consists of bitwise operations, modular additions, and compression functions.
What is the application of hash function in cryptography and network security?
Hash functions are commonly used data structures in computing systems for tasks such as checking the integrity of messages and authenticating information. While they are considered cryptographically "weak" because they can be solved in polynomial time, they are not easily decipherable.
What is a real life example of hashing?
There are many practical examples of hash tables used in every-day life. A popular example is in username-password databases. Every time someone signs up on a website using a username and password, that information must be stored somewhere for later retrieval.
What are the requirements and security of cryptographic hash functions?
Generally, the basic security of cryptographic hash functions can be seen from different angles: pre-image resistance, second pre-image resistance, collision resistance, and pseudo-randomness. . This concept is related to that of the one-way function.
Secure and efficient parallel hash function construction and its application on cloud audit. ... an essential function in audit scheme which occupies most of ...
Hash functions serve as a fundamental cryptographic primitives and are used in numerous security fields, such as cloud audit, digital signature, block chain and ...
Dec 27, 2020 · In this paper, a parallel, secure and fast hash function algorithm that is based on 3C construction is proposed. It is an enhancement for the MD ...
In this paper, the parallel structure of hash function is analyzed. Then, a parallel hash function based on coupled map lattices is proposed.
The hash function is a function that can convert data from variable size to fixed-size data that can be used in security of communication like, ...
Mar 31, 2024 · Cloud audit is a method for verifying data integrity in cloud computing, ensuring authenticity and reliability through efficient hash functions ...
... hash function based on multiple compressive parallel structures ... Secure and efficient parallel hash function construction and its application on cloud audit.
Dec 1, 2022 · Hash functions serve as a fundamental cryptographic primitives and are used in numerous security fields, such as cloud audit, digital signature, ...