Visible to the public Design and implementation of efficient hash functions

TitleDesign and implementation of efficient hash functions
Publication TypeConference Paper
Year of Publication2022
AuthorsZhuoyu, Han, Yongzhen, Li
Conference Name2022 IEEE 2nd International Conference on Power, Electronics and Computer Applications (ICPECA)
Keywordscompositionality, Computer applications, Conferences, Focusing, hash algorithms, Hash Function, Hash functions, MD5, Network security, passwords, power electronics, pubcrawl, resilience, Resiliency
AbstractWith the rapid popularity of the network, the development of information encryption technology has a significant role and significance in securing network security. The security of information has become an issue of concern to the whole society, and the study of cryptography has been increasingly concerned, and the hash function is the core of modern cryptography, the most common hash algorithms are MD5 series of algorithms, SHA series of algorithms. MD5 is a popular and excellent typical Hash encryption technology today, which is used for password management, electronic signature, spam screening. In this paper, we focus on the improved MD5 algorithm with more efficiency, focusing on the internal structure of MD5, and finally making it more efficient in retrieval.
DOI10.1109/ICPECA53709.2022.9719176
Citation Keyzhuoyu_design_2022