2015
DOI: 10.1007/978-3-319-15943-0_18
|View full text |Cite
|
Sign up to set email alerts
|

LSH: A New Fast Secure Hash Function Family

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
20
0
1

Year Published

2016
2016
2023
2023

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 16 publications
(21 citation statements)
references
References 33 publications
0
20
0
1
Order By: Relevance
“…The two‐word mix function M X r , l ( X , Y ) = ( X ′, Y ′) is defined by , where α r , β r , and γ l are constants. As to the round constants SClr, we refer the readers to for detailed definitions. aXX+Y,bXaXSClrαr,aYbX+Y,bYaYβrXbX+bYYbYγl Word‐Permutation Function.…”
Section: Preliminarymentioning
confidence: 99%
See 3 more Smart Citations
“…The two‐word mix function M X r , l ( X , Y ) = ( X ′, Y ′) is defined by , where α r , β r , and γ l are constants. As to the round constants SClr, we refer the readers to for detailed definitions. aXX+Y,bXaXSClrαr,aYbX+Y,bYaYβrXbX+bYYbYγl Word‐Permutation Function.…”
Section: Preliminarymentioning
confidence: 99%
“…Therefore, a hash function with good software performance would be more marketable when considering the present and the near future. The LSH , a new hash function family proposed by Kim et al at ICISC 2014, is designed in accordance with such circumstances and considerations. As a software oriented hash function, LSH has two versions namely LSH‐256 and LSH‐512, suitable for 32‐bit and 64‐bit processors, respectively.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…[9,10] 본 논문에서는 실제 무결성 검사를 위해 사용 되는APP Protect라는 솔루션에 적용되어 있는 SHA [11] 와 국내에서 개발된 LSH [12] 의 성능을 비교한다. …”
unclassified