About 1,157,883 results (1,441 milliseconds)

Post-Quantum Cryptography Trimester - Computational Group ...

https://sites.google.com/view/pqa-ihp-2024/computational-group-theory-and-applications-workshop
This gives many examples of group theoretic hash functions combining quick mixing properties and high girth, which give rise to good properties of hash ...

aappleby/smhasher: Automatically exported from code ... - GitHub

https://code.google.com/p/smhasher
... properties of non-cryptographic hash functions. This is the home for the MurmurHash family of hash functions along with the SMHasher test suite used to ...

US5732138A - Method for seeding a pseudo-random number ...

https://patents.google.com/patent/US5732138A/en
In other words, there may be strings x and y such that x does not equal y but hash(x)=hash(y). Cryptographic hash functions have the following properties: 1) ...

WO2012129638A2 - Method and system for protecting execution of ...

https://patents.google.com/patent/WO2012129638A2/en
Oct 4, 2012 ... ... hash function, it is very easy to compute its output. However, secure cryptographic hash functions must satisfy a mathematical property ...

Good random hash function?

https://groups.google.com/g/proceduralcontent/c/AuvxuA1xqmE/m/fESnQkVilvAJ
Sep 2, 2012 ... So basically, good randomness properties ... Cryptographic level hash functions also fulfill these demands, but fulfill a lot more cryptography ...

US5432852A - Large provably fast and secure digital signature ...

https://patents.google.com/patent/US5432852A/en
... cryptographic hash functions. H ELECTRICITY. H04 ELECTRIC COMMUNICATION ... The hash function h used for pre-hashing needs to have two important properties ...

EWHA-KMS IWC 2021 - Abstracts

https://sites.google.com/view/ewha-kms-iwc-2021/abstracts
... properties of cryptographic hash functions. In this talk I will survey the recent results on Fiat-Shamir and mention future directions. Dooho Choi Quantum ...

US20130262421A1 - Checksum and hashing operations resilient to ...

https://patents.google.com/patent/US20130262421A1/en
A resilient hashing system leverages a fast, non-cryptographic hash/checksum function that has good diffusion properties while remaining reasonably ...

NY Group Theory Cooperative - Fall 2023

https://sites.google.com/site/nygrouptheory/fall-2023
We show that properly designed spherical functions have good cryptographic properties ... hash functions (assuming that some lattice problems are hard). 4 ...

Diversity of signature schemes

https://groups.google.com/a/list.nist.gov/g/pqc-forum/c/2LEoSpskELs
We often separate Public key cryptography function into two entities, like data controller and key manager,. so that data controller can calculate hash, and ...

Payment data cryptography for merchants | Google Pay API for ...

https://developers.google.com/pay/api/android/guides/resources/payment-data-cryptography
Card. The following properties make up a payment credential for the CARD payment method: ... To generate the expected MAC, use HMAC (RFC 5869) with hash function ...

US5664016A - Method of building fast MACS from hash functions ...

https://patents.google.com/patent/US5664016A/en
Hash functions are important in modern cryptography. Main applications are their use in conjunction ... A hash function must satisfy the following properties: 1.

US20090262925A1 - Method for designing a secure hash function ...

https://patents.google.com/patent/US20090262925A1/en
Oct 22, 2009 ... Hash functions with this property are used for a variety of computational purposes, including cryptography. The hash value is a concise ...

US6578144B1 - Secure hash-and-sign signatures - Google Patents

https://patents.google.com/patent/US6578144B1/en
The term “a cryptographic hash function” is used by those skilled in the art to refer to a hash function that has additional cryptographic properties. For ...

US20100306541A1 - Hash function using a card shuffling process ...

https://patents.google.com/patent/US20100306541A1/en
Dec 2, 2010 ... In the computer data security field, a cryptographic hash function ... Several properties are required for the use of hash functions in ...

US20100304826A1 - Hash function using a roulette game process ...

https://patents.google.com/patent/US20100304826A1/en
In the computer data security field, a cryptographic hash function process ... Several properties are required for the use of hash functions in ...

‪Yiyuan Luo‬ - ‪Google Scholar‬

https://scholar.google.com/citations?user=qRtx7kIAAAAJ&hl=fr
Cryptographyblock cipherhash functionstream cipher. ArticlesCited byPublic ... 2011. WG-7: a lightweight stream cipher with good cryptographic properties.

Pseudo-Random Function (PRF) | Tink | Google for Developers

https://developers.google.com/tink/prf
Nov 14, 2024 ... PRF has the following properties: ... Use cases for PRF include deterministic redaction of personally identifiable information (PII), keyed hash ...

Kyber decisions, part 1: Symmetric crypto

https://groups.google.com/a/list.nist.gov/g/pqc-forum/c/5HveEPBsbxY
All properties one would expect from a hash function are achieved by Keccak with 12 rounds (by a comfortable margin!). Also, the requirements on the output ...

US8184803B2 - Hash functions using elliptic curve cryptography ...

https://patents.google.com/patent/US8184803B2/en
From the above, it is obvious that hash functions must exhibit strong security properties in order to ensure that they do not degrade the security of the whole ...