Sökning: "Hash Functions"

Visar resultat 16 - 20 av 23 uppsatser innehållade orden Hash Functions.

  1. 16. Jämförelse av icke-kryptografiska hashfunktionerför användning i hashtabeller

    Kandidat-uppsats, KTH/Skolan för datavetenskap och kommunikation (CSC)

    Författare :JONATAN LÖVGREN; FILIP ÖSTERMARK; [2014]
    Nyckelord :;

    Sammanfattning : This report examines some common or otherwise interestingnon-cryptographic hash functions with respect to the number of collisions when used in hash tables for different types of hashkeys. The report answers which of the examined hash functions can be seen as the best performing for the chosen hashkeys. LÄS MER

  2. 17. Algorithm and software development for security estimation of SPN-based block cipher against related-key attacks

    Master-uppsats, Linnéuniversitetet/Institutionen för datavetenskap (DV)

    Författare :Dmytro Kaidalov; [2014]
    Nyckelord :Algorithm and software development for security estimation of SPN-based block cipher against related-key attacks;

    Sammanfattning : Symmetric block ciphers are among the most widely used cryptographic primitives. In addition to providing privacy via encryption, block ciphers are used as basic components in the construction of hash functions, message authentication codes, pseudorandom number generator, as part of various cryptographic protocols and etc. LÄS MER

  3. 18. Efficient Key Generation and Distributionon Wireless Sensor Networks

    Uppsats för yrkesexamina på avancerad nivå, KTH/Kommunikationsnät

    Författare :Victor Arino Perez; [2013]
    Nyckelord :;

    Sammanfattning : Wireless Sensor Networks have become popular during the last years. The introduction ofIPv6 which broadened the address space available, IEEE802.15.4 and adaption layers such as6loWPAN have allowed the intercommunication of small devices. LÄS MER

  4. 19. On the Properties of S-boxes : A Study of Differentially 6-Uniform Monomials over Finite Fields of Characteristic 2

    Master-uppsats, KTH/Matematik (Avd.)

    Författare :Léo Paul Perrin; [2013]
    Nyckelord :Symmetric cryptography; Differential uniformity; Differential spectrum; Kloosterman sum; Power function; Roots of trinomial; x⟶x^ 2t-1 ; Dickson polynomial; Differential Cryptanalysis;

    Sammanfattning : S-boxes are key components of many symmetric cryptographic primitives. Among them, some block ciphers and hash functions are vulnerable to attacks based on differential cryptanalysis, a technique introduced by Biham and Shamir in the early 90’s. LÄS MER

  5. 20. Crypto analysis and its applications to password hashing

    Master-uppsats, KTH/Kommunikationssystem, CoS

    Författare :Jens Christian Hillerup; [2013]
    Nyckelord :;

    Sammanfattning : Hash functions are a type of mathematical function that takes an input of arbitrary length and gives an output of fixed length, called a hash value. Many consider hash values to be sort of a “fingerprint” of some data, since they can be assumed to have unique outputs for any possible input. LÄS MER