News
Chaotic Hash Functions and Cryptographic Algorithms Publication Trend The graph below shows the total number of publications each year in Chaotic Hash Functions and Cryptographic Algorithms.
An algorithm of hash functions with increased reliability is proposed, which, according to test results, provides an avalanche effect sensitivity of 87% on 10 thousand 32-bit pairs instead of the ...
A hash function is a mathematical algorithm that takes input of any length and produces a fixed-length output, commonly known as a hash value or digest. A cryptographic hash function is a specialized ...
Hash functions produce digital fingerprints, also called MAC, which are used to meet multiple needs. Secure hash algorithms family is the most used hashing algorithms in current cryptosystems and it ...
However, the algorithms used to hash passwords in most cases are functions such as SHA-1 and MD5, which have known weaknesses that open them up to brute-force attacks. So if an attacker is able to ...
Perceptual hash functions aim to imitate human perception by focusing on the types of features that drive human sight and hearing.
The SHA-1 hashing algorithm, still used to sign almost one in three SSL certificates, can now be attacked for as little as $75,000, and should be urgently retired, researchers say ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results