Petra-r cryptographic hash functions

被引:0
|
作者
Najjar, M [1 ]
机构
[1] Appl Sci Univ, Fac Comp Sci & Informat Technol, Amman, Jordan
关键词
cryptography; data integrity; hash functions; data driven hash functions;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In the paper we present a new cryptographic hash function called Petra-r, where ris an element of{192, 256} is the bitlength of the hash result. In designing Petra-r hash functions we formulated some goals, and one of them is especially crucial: processing an input message, the order of accessing source words should be data driven, i.e., the source words should be defined entirely before processing the input message and should be dependent on this message. We present the structure of the algorithms, results of computational experiments on them, and in Appendix we give procedures implementing the hash functions.
引用
收藏
页码:253 / 259
页数:7
相关论文
共 50 条
  • [21] A high-throughput processor for cryptographic hash functions
    Huo, Yuanhong
    Liu, Dake
    Journal of Communications, 2016, 11 (07): : 702 - 709
  • [22] Edon-R(256, 384, 512) - an efficient implementation of Edon-R, family of cryptographic hash functions
    Gligoroski, Danilo
    Knapskog, Svein Johan
    COMMENTATIONES MATHEMATICAE UNIVERSITATIS CAROLINAE, 2008, 49 (02): : 219 - 239
  • [23] Cryptographic Boolean Functions with R
    Lafitte, Frederic
    Van Heule, Dirk
    Van Hamme, Julien
    R JOURNAL, 2011, 3 (01): : 44 - 47
  • [24] Performance of the most common non-cryptographic hash functions
    Estebanez, Cesar
    Saez, Yago
    Recio, Gustavo
    Isasi, Pedro
    SOFTWARE-PRACTICE & EXPERIENCE, 2014, 44 (06): : 681 - 698
  • [25] Inverting Cryptographic Hash Functions via Cube-and-Conquer
    Zaikin, Oleg
    Journal of Artificial Intelligence Research, 2024, 81 : 359 - 399
  • [26] High speed calculation of cryptographic hash functions by CNN chips
    Csapodi, M
    Vandewalle, J
    Roska, T
    CNNA 98 - 1998 FIFTH IEEE INTERNATIONAL WORKSHOP ON CELLULAR NEURAL NETWORKS AND THEIR APPLICATIONS - PROCEEDINGS, 1998, : 186 - 191
  • [27] Weak security notions of cryptographic unkeyed hash functions and their amplitiability
    Hirose, S
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2005, E88A (01) : 33 - 38
  • [28] Practical Attacks on AES-like Cryptographic Hash Functions
    Kolbl, Stefan
    Rechberger, Christian
    PROGRESS IN CRYPTOLOGY - LATINCRYPT 2014, 2015, 8895 : 259 - 271
  • [29] Questioning the Criteria for Evaluating Non-cryptographic Hash Functions
    Hayes, Catherine
    Malone, David
    Queue, 2024, 22 (04): : 54 - 72
  • [30] . Instruction Set Extensions for Cryptographic Hash Functions on a Microcontroller Architecture
    Constantin, Jeremy H-F
    Burg, Andreas P.
    Guerkaynak, Frank K.
    2012 IEEE 23RD INTERNATIONAL CONFERENCE ON APPLICATION-SPECIFIC SYSTEMS, ARCHITECTURES AND PROCESSORS (ASAP), 2012, : 117 - 124