Asset Details
MbrlCatalogueTitleDetail
Do you wish to reserve the book?
New concept for cryptographic construction design based on noniterative behavior
by
Omary, Fouzia
, Abouchouar, Abdallah
, Achkoun, Khadija
in
Computer networks
/ Cost analysis
/ Cryptography
/ Security
2020
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
New concept for cryptographic construction design based on noniterative behavior
by
Omary, Fouzia
, Abouchouar, Abdallah
, Achkoun, Khadija
in
Computer networks
/ Cost analysis
/ Cryptography
/ Security
2020
Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
New concept for cryptographic construction design based on noniterative behavior
Journal Article
New concept for cryptographic construction design based on noniterative behavior
2020
Request Book From Autostore
and Choose the Collection Method
Overview
Nowadays, cryptography especially hash functions require to move from classical paradigms to an original concept able to handle security issues and new hardware architecture challenges as in distributed systems. In fact, most of current hash functions apply the same design pattern that was proved vulnerable against security threats; hence the impact of a potential weakness can be costly. Thus, the solution begins with a deep analysis of divers attack strategies; this way can lead to finding a new approach that enables new innovative and reliable candidates as alternative hash functions. So to achieve this goal, in this article we introduce a new construction design that consists of a non-iterative behavior by combining a parallel block processing and a sequential xor addition process, in order to provide a secure design without changing the expected goal of a hash function, at the same time avoid the use of vulnerable structures.
Publisher
IAES Institute of Advanced Engineering and Science
Subject
This website uses cookies to ensure you get the best experience on our website.