This paper proposes the new hash algorithm HBC-256 (Hash based on Block Cipher) based on the symmetric block cipher of the CF (Compression Function). The algorithm is based on the wipe-pipe construct, a modified version of the Merkle-Damgard construct. To transform the block cipher CF into a one-way compression function, the Davis-Meyer scheme is used, which, according to the results of research, is recognized as a strong and secure scheme for constructing hash functions based on block ciphers. The symmetric CF block cipher algorithm used consists of three transformations (Stage-1, Stage-2, and Stage-3), which include modulo two addition, circular shift, and substitution box (four-bit S-boxes). The four substitution boxes are selected from ...
© Springer-Verlag Berlin Heidelberg 1996. We consider constructions for cryptographic hash functions...
We are having various Conventional Encryption/Decryption techniques for encrypting the data to prote...
Cryptography is the art of protecting information by encrypting the original message into an unreada...
The article observes the new hashing algorithm HBC-256. The HBC-256 algorithm is based on the block ...
The article evaluates the reliability of the new HBC-256 hashing algorithm. To study the cryptograph...
This paper considers hash functions based on block ciphers. It presents a new attack on the compress...
A function that compresses an arbitrarily large message into a fixed small size ‘message digest’ is ...
A new symmetric block cipher algorithm called AL02 has been developed. The algorithm scheme provides...
A function that compresses an arbitrarily large message into a fixed small size ‘message digest’ is ...
Part 1: The International Cross Domain Conference (CD-ARES 2016)International audienceA cryptographi...
Abstract. This paper considers hash functions based on block ciphers. It presents a new attack on th...
Block cipher encryption works on fixed length blocks, usually 128bits. The blocks of data are transf...
Cryptographic hash functions or message digest have numerous applications in data security. The rece...
Cryptographic Hash Functions are main building block of message integrity. These functions have many...
This paper reviews constructions of hash functions and MAC algorithms based on block ciphers. It dis...
© Springer-Verlag Berlin Heidelberg 1996. We consider constructions for cryptographic hash functions...
We are having various Conventional Encryption/Decryption techniques for encrypting the data to prote...
Cryptography is the art of protecting information by encrypting the original message into an unreada...
The article observes the new hashing algorithm HBC-256. The HBC-256 algorithm is based on the block ...
The article evaluates the reliability of the new HBC-256 hashing algorithm. To study the cryptograph...
This paper considers hash functions based on block ciphers. It presents a new attack on the compress...
A function that compresses an arbitrarily large message into a fixed small size ‘message digest’ is ...
A new symmetric block cipher algorithm called AL02 has been developed. The algorithm scheme provides...
A function that compresses an arbitrarily large message into a fixed small size ‘message digest’ is ...
Part 1: The International Cross Domain Conference (CD-ARES 2016)International audienceA cryptographi...
Abstract. This paper considers hash functions based on block ciphers. It presents a new attack on th...
Block cipher encryption works on fixed length blocks, usually 128bits. The blocks of data are transf...
Cryptographic hash functions or message digest have numerous applications in data security. The rece...
Cryptographic Hash Functions are main building block of message integrity. These functions have many...
This paper reviews constructions of hash functions and MAC algorithms based on block ciphers. It dis...
© Springer-Verlag Berlin Heidelberg 1996. We consider constructions for cryptographic hash functions...
We are having various Conventional Encryption/Decryption techniques for encrypting the data to prote...
Cryptography is the art of protecting information by encrypting the original message into an unreada...