SM3 is a hash function standard defined by China. Unlike SHA-1 and SHA-2, it is hard for SM3 to speed up the throughput because it has more complicated compression function than other hash algorithm. In this paper, we...
详细信息
SM3 is a hash function standard defined by China. Unlike SHA-1 and SHA-2, it is hard for SM3 to speed up the throughput because it has more complicated compression function than other hash algorithm. In this paper, we propose a 4-round-in-1 structure to reduce the number of rounds, and a logical simplifying to move 3 adders and 3 XOR gates from critical path to the non-critical path. Based in SMIC 65 nm CMOS technology, the throughput of SM3 can achieve 6.54 Gbps which is higher than that of the reported designs.
In this article, a new protocol called REhash has been devised that gracefully integrates the idea of recursive unicast with hash algorithm to achieve scalable multicast for improved performance. In this model, data p...
详细信息
In this article, a new protocol called REhash has been devised that gracefully integrates the idea of recursive unicast with hash algorithm to achieve scalable multicast for improved performance. In this model, data packets have unicast destination addresses. Therefore, REhash supports pure unicast routers transparently. The key idea of the proposed protocol is to simplify address allocation and implements multicast distribution using recursive unicast hash trees. The branching nodes recursively create packet copies to implement the distribution. REhash adopts the source-specific channel abstraction to tackle the address allocation and the sender access control problems. Consequently, it provides best routes and is suitable for including QoS and authentication parameters inside hash tree construction algorithm. Additionally, REhash tree management provides enhanced tree stability in the presence of group dynamics. (c) 2006 Elsevier Ltd. All rights reserved.
The lengths of input vectors corresponding to different circuits are often quite different, which makes it difficult to standardize them. This paper proposes a characteristic standardization method for circuit input v...
详细信息
The lengths of input vectors corresponding to different circuits are often quite different, which makes it difficult to standardize them. This paper proposes a characteristic standardization method for circuit input vectors based on hash algorithm. First, the collision rates of different hash algorithms are analyzed, and four representative hash algorithms are selected to process the input vectors. Then, based on the given dataset, their performance is analyzed from collision rate, stability and distribution characteristics, and the best performing RShash algorithm is selected for further research. Next, we deal with the input vectors using RShash mapping and partitioning strategy, respectively, and then apply processed input vectors to the deep autoencoder network to perform experiments. The experimental results show that the characteristic standardization method for circuit input vectors based on RShash algorithm has better performance.
In this study, we propose a novel keyed hash algorithm based on a Boolean function and chaotic attractor. The hash algorithm called BentSign is based on two Signature attractors and XOR function and a bent Boolean fun...
详细信息
In this study, we propose a novel keyed hash algorithm based on a Boolean function and chaotic attractor. The hash algorithm called BentSign is based on two Signature attractors and XOR function and a bent Boolean function. The provided theoretical and experimental results confirm that the novel scheme can generate output hashes with a good level of security, collision resistance, and protection against most common attacks.
With technological progress, how to efficiently process and retrieve large amounts of multi-modal multimedia data has become a challenge. Although multi-modal hash algorithms have been applied in this field, their per...
详细信息
With technological progress, how to efficiently process and retrieve large amounts of multi-modal multimedia data has become a challenge. Although multi-modal hash algorithms have been applied in this field, their performance potential has not been fully realized. To fully leverage the performance of the model, a supervised discrete multi-modal hash algorithm has been proposed to improve the efficiency of multi-modal retrieval. The adaptive online multi-modal hash algorithm is used to dynamically adapt to changes in query samples. The topological semantic multi-modal hash algorithm is applied to further improve the retrieval performance of multi-modal hashes. According to the results, in the MIR Flickr dataset, the Mean Average Precision (MAP) reaches 0.8048, 0.8155, and 0.8185 at 32-bit, 64-bit, and 128-bit, respectively. Fusion Graph Convolutional multi-modal hashing (FGCMH) exhibits the bestin different datasets. From this, the designed method has high processing power in handling large-scale and high-dimensional multimedia data.
Recently, the flash storage device becomes more important to the mobile consumer electronics that supports various functionalities because of its portability and reliability. The capacity of the flash storage device i...
详细信息
Recently, the flash storage device becomes more important to the mobile consumer electronics that supports various functionalities because of its portability and reliability. The capacity of the flash storage device is becoming larger and its price is going down due to the mass production of the Triple-Level Cell (TLC) flash memory. Since TLC flash memories are very cheap, they are widely deployed in the mobile flash storage device although its durability is poor. In addition, it is difficult to handle the large-scale flash memories with limited memory resources in the mobile flash storage device. Therefore, TLC-based flash storage device requires to internally optimize the write and erase operations with small memory resources. This paper proposes a new hash-based mapping algorithm, which reduces the redundant write and erase operations and uses only a few memory resources, for the mobile flash storage device. The proposed hash algorithm also guarantees uniform performance regardless of various workload patterns. Through various experiments with related works, this paper shows the superiority of the proposed hash algorithm(1).
Information on isotopic composition and geometric structure is necessary for identifying a true warhead. Nevertheless, such classified information should be protected physically or electronically. With a novel hash en...
详细信息
Information on isotopic composition and geometric structure is necessary for identifying a true warhead. Nevertheless, such classified information should be protected physically or electronically. With a novel hash encryption algorithm, this paper presents a Monte Carlo-based design of a neutron activation analysis verification module. The verification module employs a thermal neutron source, a non-uniform mask (physically encrypting information about isotopic composition and geometric structure), a gamma detector array, and a hash encryption algorithm (for electronic encryption). In the physical field, a non-uniform mask is designed to distort the characteristic gamma rays emitted by the inspected item. Furthermore, as part of the hash algorithm, a key is introduced to encrypt the data and improve the system resolution through electronic design. In order to quantify the difference between items, Hamming distance is used, which allows data encryption and analysis simultaneously. Simulated inspections of simple objects are used to quantify system performance. It is demonstrated that the method retains superior resolution even with 1% noise level. And the performances of antistatistical attack and anti-brute force cracking are evaluated and found to be very excellent. The verification method lays a solid foundation for nuclear disarmament verification in the upcoming era.
At present the hash algorithm analysis is mostly confined to the randomness of the hash values. Researchers have not analyzed the effect of hash algorithm in the network equipment. We propose three evaluation measures...
详细信息
At present the hash algorithm analysis is mostly confined to the randomness of the hash values. Researchers have not analyzed the effect of hash algorithm in the network equipment. We propose three evaluation measures of hash algorithm from the perspective of theory analysis and experimental evaluation: the output stream integrity by combining with the dictionary sorting and binary search method to verify, the flow distribution uniformity of hash algorithm, load balancing effect according to the group packet number variance and the max-min packet number ratio. In the experiments, we evaluate the hash algorithm of the current domestic well-known network equipment manufacturers with the backbone network flow. The results show that the evaluation measure can effectively measure hash algorithm. It is helpful for network equipment manufacturers to choose proper hash algorithm.
hash functions are vital tasks in many applications such as digital fingerprinting, Internet communications, bank transactions and so forth. RACE Integrity Primitives Evaluation Message Digest-160 (RIPEMD-160) is one ...
详细信息
In this paper, we implement the SHA-256 FPGA hardware module for the security protocol of the IEEE 1609.2 vehicle communication (VC). VC requires high-throughput and low-latency hardware architectures. For fast and ef...
详细信息
ISBN:
(纸本)9781479951277
In this paper, we implement the SHA-256 FPGA hardware module for the security protocol of the IEEE 1609.2 vehicle communication (VC). VC requires high-throughput and low-latency hardware architectures. For fast and efficient design, we exploit parallel structures for preprocessing and hash computation in SHA-256. The proposed design is implemented in Vertex-5 and verified for correct hash operation. As a result, we can achieve up to 179.08 MHz with 2796 slices.
暂无评论