Design of Lightweight Hash Function Based on Iterate

2014 ◽  
Vol 577 ◽  
pp. 786-789
Author(s):  
Shu Jing Gao ◽  
Rui Quan Zhang ◽  
Wei Zhang

A hash functionhMISRthat suitable for passive devices is proposed. Taking parallel LFSR as the basic componenthMISRprovides the security through one-wayness brought by the information loss in the process of compression. When implemented, the hardware complexity ofhMISRis much lower than Toeplitz hash.

2020 ◽  
Vol 3 (2) ◽  
pp. 182-186
Author(s):  
Lisnayani Silalahi ◽  
Anita Sindar

Data security and confidentiality is currently a very important issue and continues to grow. Several cases concerning data security are now a job that requires handling and security costs that are so large. To maintain the security and confidentiality of messages, data, or information so that no one can read or understand it, except for the rightful recipients, a data security system application with an encryption method using an algorithm is designed. The SHA-1 cryptographic hash function that takes input and produces a 160-bit hash value which is known as the message iteration is usually rendered as a 40-digit long hexadecimal number.


2019 ◽  
Vol 2 (1) ◽  
pp. 1-17
Author(s):  
Muhammad Ibnu Pamungkas ◽  
Izzuddin Musthafa ◽  
Muhammad Nurhasan

Ta’lim Muta’alim is Syaikh al-Zarnūjī’s opus that consists of norms, ethics, and rules for gaining knowledge based on Islamic teachings. Thus, claimants of science could reach their goals to obtain it. This book was translated by Achmad Sunarto into Indonesian language and published by Husaini Publisher in Bandung. After reading it totally, researcher found mistakes in translation, especially mistakes in words selection (diction) in translation. And after analyzed it, researcher formulate the mistakes into 4 parts, (1) translation that is the result of direct transliteration from SL without considering its compability in TL, (2) existence of information loss and gain that effects the translation itself and makes it unsuitable, (3) choosing a word which is not suit with the meaning reference from the source text, (4) translation is unacceptable in TL because it is translated literally.


2020 ◽  
Vol 26 (2) ◽  
pp. 305-308
Author(s):  
Fabiana Martinescu-Bădălan

AbstractThis work is designed to challenge the maintenance of the highest standards of physical training required to perform armed tasks. It is desired to accumulate a development experience that will culminate with the set upof very well-trained leaders. The training of the military is based on physical training. It ensures the possibility and availability of the military to cope with combat missions, obligations in the military environment, ensures the maintenance and development of resistance to intense physical and mental effort, and develops self-confidence and teamwork. The physical training considers the fulfillment of some general objectives and of some specific objectives, absolutely necessary in the conditions of carrying out the combat actions.


2020 ◽  
pp. 38-47
Author(s):  
Tamara Silkina ◽  
Olga Petrova

The article presents analysis of modern laboratory technologies and requirements for the quality of laboratory tests in the Russian Federation. Basic rules that improve the quality of laboratory tests at the preanalytical, analytical and postanalytical stage are studied on the example of tests in the Laboratory Hemotest. The optimal list of laboratory tests used in the practice of a general practitioner and organizational options for performing laboratory tests, the features of the process that affect the speed of obtaining a result by a doctor in an outpatient setting and in hospital, are presented.


2012 ◽  
Vol 35 (9) ◽  
pp. 1868 ◽  
Author(s):  
Wei YU ◽  
Kun-Peng WANG ◽  
Bao LI ◽  
Song TIAN
Keyword(s):  

2013 ◽  
Vol 33 (5) ◽  
pp. 1350-1352
Author(s):  
Peng LIU ◽  
Changhong ZHANG ◽  
Qingyu OU

Author(s):  
Arvind Kakria ◽  
Trilok Chand Aseri

Background & Objective: Wireless communication has immensely grown during the past few decades due to significant demand for mobile access. Although cost-effective as compared to their wired counterpart, maintaining good quality-of-service (QoS) in these networks has always remained a challenge. Multiple-input Multiple-output (MIMO) systems, which consists of multiple transmitter and receiver antennas, have been widely acknowledged for their QoS and transmit diversity. Though suited for cellular base stations, MIMO systems are not suited for small-sized wireless nodes due to their hardware complexity, cost, and increased power requirements. Cooperative communication that allows relays, i.e. mobile or fixed nodes in a communication network, to share their resources and forward other node’s data to the destination node has substituted the MIMO systems nowadays. To harness the full benefit of cooperative communication, appropriate relay node selection is very important. This paper presents an efficient single-hop distributed relay supporting medium access control (MAC) protocol (EDSRS) that works in the single-hop environment and improves the energy efficiency and the life of relay nodes without compensating the throughput of the network. Methods: The protocol has been simulated using NS2 simulator. The proposed protocol is compared with energy efficient cooperative MAC protocol (EECOMAC) and legacy distributed coordination function (DCF) on the basis of throughput, energy efficiency, transmission delay and an end to end delay with various payload sizes. Result and Conclusion: The result of the comparison indicates that the proposed protocol (EDSRS) outperforms the other two protocols.


Author(s):  
J. R. B. Cockett ◽  
R. A. G. Seely

This chapter describes the categorical proof theory of the cut rule, a very basic component of any sequent-style presentation of a logic, assuming a minimum of structural rules and connectives, in fact, starting with none. It is shown how logical features can be added to this basic logic in a modular fashion, at each stage showing the appropriate corresponding categorical semantics of the proof theory, starting with multicategories, and moving to linearly distributive categories and *-autonomous categories. A key tool is the use of graphical representations of proofs (“proof circuits”) to represent formal derivations in these logics. This is a powerful symbolism, which on the one hand is a formal mathematical language, but crucially, at the same time, has an intuitive graphical representation.


Author(s):  
Keith M. Martin

This chapter discusses cryptographic mechanisms for providing data integrity. We begin by identifying different levels of data integrity that can be provided. We then look in detail at hash functions, explaining the different security properties that they have, as well as presenting several different applications of a hash function. We then look at hash function design and illustrate this by discussing the hash function SHA-3. Next, we discuss message authentication codes (MACs), presenting a basic model and discussing basic properties. We compare two different MAC constructions, CBC-MAC and HMAC. Finally, we consider different ways of using MACs together with encryption. We focus on authenticated encryption modes, and illustrate these by describing Galois Counter mode.


Sign in / Sign up

Export Citation Format

Share Document