The performance of hash function computations can impose a significant workload on SSL/TLS authentication servers. In the WLCG this workload shows also in the computation of data transfers checksums. It has been shown in the EGI grid infrastructure that the checksum computation can double the IO load for large file transfers leading to an increase in re-transfers and timeout errors. Storage managers like SToRM try to reduce that impact by computing the checksum during the transfer. That may not be feasible, however, when multiple transfer streams are combined with the use of hashes like MD-5 or SHA-2. We present two alternatives to reduce the hash computation load. First we introduce implementations for the Fast SHA-256 and SHA-512 that can...
We describe a method for efficiently hashing multiple messages of different lengths. Such computatio...
Abstract. A hash function is a well-known method in computer science to map arbitrary large data to ...
Abstract—During a forensic investigation, an investigator might be required to analyze the content o...
The sequential computation of hashes at the core of many distributed storage systems and found, for ...
The sequential computation of hashes at the core of many distributed storage systems and found, for ...
The sequential computation of hashes at the core of many distributed storage systems and found, for ...
Abstract. The sequential computation of hashes at the core of many distributed storage systems and f...
Hash functions are utilized in the security layer of every communication protocol and in signature a...
Abstract:- The main applications of the hash functions are met in the fields of communication integr...
This paper describes the results of an extensive study and comparison of popular hash functions SHA-...
Cryptographic applications are essential in tight security and super speed security applications. Th...
We present new software speed records for several popular hash functions on low-end 8-bit AVR microc...
Hash functions are forming a special family of cryptographic algorithms, which are applied wherever ...
Hashing functions play a fundamental role in modern cryptography. Such functions process data of fin...
A hash function is a well-known method in computer science to map arbitrary large data to bit string...
We describe a method for efficiently hashing multiple messages of different lengths. Such computatio...
Abstract. A hash function is a well-known method in computer science to map arbitrary large data to ...
Abstract—During a forensic investigation, an investigator might be required to analyze the content o...
The sequential computation of hashes at the core of many distributed storage systems and found, for ...
The sequential computation of hashes at the core of many distributed storage systems and found, for ...
The sequential computation of hashes at the core of many distributed storage systems and found, for ...
Abstract. The sequential computation of hashes at the core of many distributed storage systems and f...
Hash functions are utilized in the security layer of every communication protocol and in signature a...
Abstract:- The main applications of the hash functions are met in the fields of communication integr...
This paper describes the results of an extensive study and comparison of popular hash functions SHA-...
Cryptographic applications are essential in tight security and super speed security applications. Th...
We present new software speed records for several popular hash functions on low-end 8-bit AVR microc...
Hash functions are forming a special family of cryptographic algorithms, which are applied wherever ...
Hashing functions play a fundamental role in modern cryptography. Such functions process data of fin...
A hash function is a well-known method in computer science to map arbitrary large data to bit string...
We describe a method for efficiently hashing multiple messages of different lengths. Such computatio...
Abstract. A hash function is a well-known method in computer science to map arbitrary large data to ...
Abstract—During a forensic investigation, an investigator might be required to analyze the content o...