Computational complexity and implementation aspects of the incremental hash function
This paper gives the computational complexity and practical implementation aspects of a newly introduced incremental hash function called Pair Chaining & Modular Arithmetic Combining Incremental Hash Function (PCIHF). The boundary conditions of the parameters involved in the update process of PC...
| Main Authors: | Goi, Bok Min, Siddiqi, M. U., Chuah, Hean Teik |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
2003
|
| Subjects: | |
| Online Access: | http://shdl.mmu.edu.my/2533/ http://shdl.mmu.edu.my/2533/1/1797.pdf |
Similar Items
A Fast Incremental Cryptographic Hash Function
by: Goi , Bok Min
Published: (2003)
by: Goi , Bok Min
Published: (2003)
A Fast Incremental Cryptographic Hash Function
by: Goi, Bok Min
Published: (2003)
by: Goi, Bok Min
Published: (2003)
Design and implementation of MD5 hash function algorithm using verilog HDL
by: Shamsiah, Suhaili, et al.
Published: (2022)
by: Shamsiah, Suhaili, et al.
Published: (2022)
Cryptanalysis of two non-anonymous buyer-seller watermarking protocols for content protection
by: Goi, Bok Min, et al.
Published: (2007)
by: Goi, Bok Min, et al.
Published: (2007)
SHA family hash function
by: Abdulmajed, Khanssaa Munthir, et al.
Published: (2011)
by: Abdulmajed, Khanssaa Munthir, et al.
Published: (2011)
RIPEMD and Chameleon hash function
by: Mahmood Al Dabbagh, Sufyan Salim, et al.
Published: (2011)
by: Mahmood Al Dabbagh, Sufyan Salim, et al.
Published: (2011)
Biometric hash: high-confidence face recognition
by: Ngo, D.C.L., et al.
Published: (2006)
by: Ngo, D.C.L., et al.
Published: (2006)
Broad view of cryptographic hash functions
by: Alahmad, Mohammad, et al.
Published: (2013)
by: Alahmad, Mohammad, et al.
Published: (2013)
Omega network hash construction
by: Chuah, Chai Wen
Published: (2009)
by: Chuah, Chai Wen
Published: (2009)
Rtl Implementation Of Secure Hash Algorithm 3 (Sha-3) Towards Smaller Area
by: Lim , Yen Ruen
Published: (2017)
by: Lim , Yen Ruen
Published: (2017)
Image Steganography Using Hash Function And Compression
by: Ahmad Sulaiman, Zurkifli
Published: (2023)
by: Ahmad Sulaiman, Zurkifli
Published: (2023)
Pipeline implementation of secure hash algorithm (SHA-l) for cryptographic application in network security
by: Hani, Mohamed Khalil, et al.
Published: (2000)
by: Hani, Mohamed Khalil, et al.
Published: (2000)
New constructions of universal hash functions based on function sums
by: Khoo, , K, et al.
Published: (2006)
by: Khoo, , K, et al.
Published: (2006)
Design and analysis of a new hash function gear
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
Cryptographic hash function: a high level view
by: Taha, Imad, et al.
Published: (2015)
by: Taha, Imad, et al.
Published: (2015)
A new design of cryptographic hash function: gear
by: Alkandari, Abdulaziz M, et al.
Published: (2015)
by: Alkandari, Abdulaziz M, et al.
Published: (2015)
A new design of cryptographic hash function: gear
by: Alkandari, Abdulaziz M, et al.
Published: (2015)
by: Alkandari, Abdulaziz M, et al.
Published: (2015)
MOIM: a novel design of cryptographic hash function
by: Alahmad, Mohammad, et al.
Published: (2013)
by: Alahmad, Mohammad, et al.
Published: (2013)
Hash function of finalist SHA-3: analysis study
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2013)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2013)
Cryptographic hash function: A high level view
by: Alkandari, Abdulaziz Ali, et al.
Published: (2013)
by: Alkandari, Abdulaziz Ali, et al.
Published: (2013)
Received signal statistics in ds-cdma channels with flat rayleigh fading and fast closed-loop power control
by: Sim, Moh Lim, et al.
Published: (2003)
by: Sim, Moh Lim, et al.
Published: (2003)
Electromagnetic scattering from an electrically dense vegetation medium
by: Ewe, Hong Tat, et al.
Published: (2000)
by: Ewe, Hong Tat, et al.
Published: (2000)
QSCILLOSCOPE: A PC-Based Real Time Oscilloscope
by: Yiqi, Tew, et al.
Published: (2008)
by: Yiqi, Tew, et al.
Published: (2008)
QSCILLOSCOPE: A PC-Based Real Time Oscilloscope
by: Yiqi, Tew, et al.
Published: (2008)
by: Yiqi, Tew, et al.
Published: (2008)
Fragile watermarking scheme based on SHA-256 hash function and mersenne twister for medical image authentication
by: Noor Aqilah, Abdul Halim, et al.
Published: (2020)
by: Noor Aqilah, Abdul Halim, et al.
Published: (2020)
Implementation of hashed cryptography algorithm based on cryptography message syntax
by: Ali, Mohammed Ahnaf
Published: (2019)
by: Ali, Mohammed Ahnaf
Published: (2019)
Management of punching oil study for stamping process efficiency increment
by: Abd. Samad @ Mahmood, Md. Fahmi
Published: (2001)
by: Abd. Samad @ Mahmood, Md. Fahmi
Published: (2001)
A finite-difference time-domain FDTD) software for simulation of printed circuit board (PCB) assembly
by: Kung, Fabian Wai Lee, et al.
Published: (2005)
by: Kung, Fabian Wai Lee, et al.
Published: (2005)
Protection of the digital holy Quran using SAB hash function
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2013)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2013)
Indexing-First-One Hashing based Cancellable Iris Template Generation
by: Lai, Yen Lung
Published: (2017)
by: Lai, Yen Lung
Published: (2017)
Increment of Steel Tonnage for Reinforced Concrete School Building Considering Seismic Design
by: H. A., Roslan, et al.
Published: (2019)
by: H. A., Roslan, et al.
Published: (2019)
Cancellable biometrics and annotations on BioHash
by: TEOH, A, et al.
Published: (2008)
by: TEOH, A, et al.
Published: (2008)
Protocol of secure key distribution using Hash Functions and Quantum Authenticated channels (KDP-6DP)
by: Majeed, Mohammed Munther A, et al.
Published: (2010)
by: Majeed, Mohammed Munther A, et al.
Published: (2010)
Finite element investigatigation of some aspects affecting the depth and wall thickness of a part formed by single point incremental forming process
by: Hrairi, Meftah, et al.
Published: (2011)
by: Hrairi, Meftah, et al.
Published: (2011)
Development of a ground-based radar for scattering measurements
by: Koo, Voon Chet, et al.
Published: (2003)
by: Koo, Voon Chet, et al.
Published: (2003)
Higher Order Nonlinear Effect and Limitation of Soliton Propagation in Dispersive-Nonlinear Medium for Dispersion-Shifted Fiber
by: Mohammed, Abbou Fouad, et al.
Published: (2001)
by: Mohammed, Abbou Fouad, et al.
Published: (2001)
A secure key distribution protocol based on hash functions and a quantum-authenticated channel using 6DP (KDP-6DP)
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2010)
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2010)
No deferment on revised increment
by: The Star
Published: (2016)
by: The Star
Published: (2016)
Eigenspace-based face hashing
by: Ngo, , DCL, et al.
Published: (2004)
by: Ngo, , DCL, et al.
Published: (2004)
A collision resistant cryptographic hash function based on cellular automata rules
by: Jamil, Norziana
Published: (2013)
by: Jamil, Norziana
Published: (2013)
Similar Items
-
A Fast Incremental Cryptographic Hash Function
by: Goi , Bok Min
Published: (2003) -
A Fast Incremental Cryptographic Hash Function
by: Goi, Bok Min
Published: (2003) -
Design and implementation of MD5 hash function algorithm using verilog HDL
by: Shamsiah, Suhaili, et al.
Published: (2022) -
Cryptanalysis of two non-anonymous buyer-seller watermarking protocols for content protection
by: Goi, Bok Min, et al.
Published: (2007) -
SHA family hash function
by: Abdulmajed, Khanssaa Munthir, et al.
Published: (2011)