The transfer of information by telecommunication channels is accompanied by message hashing to control the integrity of the data and confirm the authenticity of the data. When using a reliable hash function, it is computationally difficult to create a fake message with a pre-existing hash code, however, due to the weaknesses of specific hashing algorithms, this threat can be feasible. To increase the level of cryptographic strength of transmitted messages over telecommunication channels, there are ways to create hash codes, which, according to practical research, are imperfect in terms of the speed of their formation and the degree of cryptographic strength. The collisional properties of hashing functions formed using the modified UMAC algo...
With the introduction of electronic form of data, the need for an automatic system of security to pr...
Cryptographic hash functions are one of the widely used cryptographic primitives with a purpose to e...
Cryptographic Hash Functions are main building block of message integrity. These functions have many...
The transfer of information by telecommunication channels is accompanied by message hashing to contr...
The development of computer technology has determined the vector for the expansion of services based...
The development of computer technology has determined the vector for the expansion of services based...
The article covers the research of message authentication codes based on universal hashing. The new ...
Information security, reliability of data transfer are today an important component of the globaliza...
Information security, reliability of data transfer are today an important component of the globaliza...
Cryptographic hash functions are an important tool in cryptography to achieve certain security goals...
The subject of this thesis is the study of collision resistant hash function. A cryptographic hash f...
In this paper, we analyze the security of HMAC and NMAC, both of which are hash-based message authen...
Hash functions belong to elements of modern cryptography. Their task is to transfer the data expecte...
The hash function is the most important cryptographic primitive function and is an integral part of ...
A function that compresses an arbitrarily large message into a fixed small size ‘message digest’ is ...
With the introduction of electronic form of data, the need for an automatic system of security to pr...
Cryptographic hash functions are one of the widely used cryptographic primitives with a purpose to e...
Cryptographic Hash Functions are main building block of message integrity. These functions have many...
The transfer of information by telecommunication channels is accompanied by message hashing to contr...
The development of computer technology has determined the vector for the expansion of services based...
The development of computer technology has determined the vector for the expansion of services based...
The article covers the research of message authentication codes based on universal hashing. The new ...
Information security, reliability of data transfer are today an important component of the globaliza...
Information security, reliability of data transfer are today an important component of the globaliza...
Cryptographic hash functions are an important tool in cryptography to achieve certain security goals...
The subject of this thesis is the study of collision resistant hash function. A cryptographic hash f...
In this paper, we analyze the security of HMAC and NMAC, both of which are hash-based message authen...
Hash functions belong to elements of modern cryptography. Their task is to transfer the data expecte...
The hash function is the most important cryptographic primitive function and is an integral part of ...
A function that compresses an arbitrarily large message into a fixed small size ‘message digest’ is ...
With the introduction of electronic form of data, the need for an automatic system of security to pr...
Cryptographic hash functions are one of the widely used cryptographic primitives with a purpose to e...
Cryptographic Hash Functions are main building block of message integrity. These functions have many...