April 29, 2024, 4:11 a.m. | Elena R. Henderson, Jessie M. Henderson, William V. Oxford, Mitchell A. Thornton

cs.CR updates on arXiv.org arxiv.org

arXiv:2404.17142v1 Announce Type: cross
Abstract: Several cryptographic systems depend upon the computational difficulty of reversing cryptographic hash functions. Robust hash functions transform inputs to outputs in such a way that the inputs cannot be later retrieved in a reasonable amount of time even if the outputs and the function that created them are known. Consequently, hash functions can be cryptographically secure, and they are employed in encryption, authentication, and other security methods. It has been suggested that such cryptographically-secure hash …

arxiv automated computational computing cryptographic cs.cr function functions hash hash functions inputs quant-ph quantum reversing systems transform

Information Security Engineers

@ D. E. Shaw Research | New York City

Technology Security Analyst

@ Halton Region | Oakville, Ontario, Canada

Senior Cyber Security Analyst

@ Valley Water | San Jose, CA

Senior Security Analyst

@ Oracle | United States

Associate Vulnerability Management Specialist

@ Diebold Nixdorf | Hyderabad, Telangana, India

Cybersecurity Architect, Infrastructure & Technical Security

@ KCB Group | Kenya