Petra-r cryptographic hash functions

被引:0
|
作者
Najjar, M [1 ]
机构
[1] Appl Sci Univ, Fac Comp Sci & Informat Technol, Amman, Jordan
关键词
cryptography; data integrity; hash functions; data driven hash functions;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In the paper we present a new cryptographic hash function called Petra-r, where ris an element of{192, 256} is the bitlength of the hash result. In designing Petra-r hash functions we formulated some goals, and one of them is especially crucial: processing an input message, the order of accessing source words should be data driven, i.e., the source words should be defined entirely before processing the input message and should be dependent on this message. We present the structure of the algorithms, results of computational experiments on them, and in Appendix we give procedures implementing the hash functions.
引用
收藏
页码:253 / 259
页数:7
相关论文
共 50 条
  • [1] Cryptographic hash functions
    Preneel, Bart
    European transactions on telecommunications and related technologies, 1994, 5 (04): : 431 - 448
  • [2] CRYPTOGRAPHIC HASH FUNCTIONS
    PRENEEL, B
    EUROPEAN TRANSACTIONS ON TELECOMMUNICATIONS, 1994, 5 (04): : 431 - 448
  • [3] The state of cryptographic hash functions
    Preneel, B
    LECTURES ON DATA SECURITY: MODERN CRYPTOLOGY IN THEORY AND PRACTICE, 1999, 1561 : 158 - 182
  • [4] Verification of Implementations of Cryptographic Hash Functions
    Wang, Dexi
    Jiang, Yu
    Song, Houbing
    He, Fei
    Gu, Ming
    Sun, Jiaguang
    IEEE ACCESS, 2017, 5 : 7816 - 7825
  • [5] Cryptographic Hash Functions: Theory and Practice
    Preneel, Bart
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2010, 2010, 6498 : 115 - 117
  • [6] Bad Directions in Cryptographic Hash Functions
    Bernstein, Daniel J.
    Huelsing, Andreas
    Lange, Tanja
    Niederhagen, Ruben
    INFORMATION SECURITY AND PRIVACY (ACISP 2015), 2015, 9144 : 488 - 508
  • [7] Cryptographic Hash Functions: Theory and Practice
    Preneel, Bart
    INFORMATION AND COMMUNICATIONS SECURITY, 2010, 6476 : 1 - 3
  • [8] Cryptographic hash functions in digital economy
    2001, Technical University of Wroclaw
  • [9] Cryptographic Hash Functions from Expander Graphs
    Charles, Denis X.
    Lauter, Kristin E.
    Goren, Eyal Z.
    JOURNAL OF CRYPTOLOGY, 2009, 22 (01) : 93 - 113
  • [10] Some Observations on the Theory of Cryptographic Hash Functions
    D. R. Stinson
    Designs, Codes and Cryptography, 2006, 38 : 259 - 277