Please use this identifier to cite or link to this item: http://hdl.handle.net/10397/104452
PIRA download icon_1.1View/Download Full Text
DC FieldValueLanguage
dc.contributorDepartment of Industrial and Systems Engineering-
dc.creatorYang, Yen_US
dc.creatorChen, Fen_US
dc.creatorChen, Jen_US
dc.creatorZhang, Yen_US
dc.creatorYung, KLen_US
dc.date.accessioned2024-02-05T08:50:02Z-
dc.date.available2024-02-05T08:50:02Z-
dc.identifier.issn1751-7575en_US
dc.identifier.urihttp://hdl.handle.net/10397/104452-
dc.language.isoenen_US
dc.publisherTaylor & Francisen_US
dc.rights© 2019 Informa UK Limited, trading as Taylor & Francis Groupen_US
dc.rightsThis is an Accepted Manuscript of an article published by Taylor & Francis in Enterprise Information Systems on 08 Jan 2019 (published online), available at: http://www.tandfonline.com/10.1080/17517575.2018.1564942.en_US
dc.subjectAvalancheen_US
dc.subjectCollision resistanceen_US
dc.subjectCompression functionen_US
dc.subjectFeedback iterative structureen_US
dc.subjectHash functionen_US
dc.titleA secure hash function based on feedback iterative structureen_US
dc.typeJournal/Magazine Articleen_US
dc.identifier.spage281en_US
dc.identifier.epage302en_US
dc.identifier.volume13en_US
dc.identifier.issue3en_US
dc.identifier.doi10.1080/17517575.2018.1564942en_US
dcterms.abstractRapid growth of internet data has created enormous security challenges on authenticity, availability and integrity protection of these outsourced data. Hash function is one of the main solutions to face these challenges. This paper proposes a feedback iterative structure of hash function which utilises the variable feedback to resist attacks. Furthermore, to accelerate message diffusion, two novel modules are designed, one for iteration and the other for truncation. Experimental results show that the proposed hash function can effectively resist existing attacks. Moreover, comparing with other existing hash functions, it displays better on statistical performance, collision resistance and avalanche.-
dcterms.accessRightsopen accessen_US
dcterms.bibliographicCitationEnterprise information systems, 2019, v. 13, no. 3, p. 281-302en_US
dcterms.isPartOfEnterprise information systemsen_US
dcterms.issued2019-
dc.identifier.scopus2-s2.0-85059957797-
dc.identifier.eissn1751-7583en_US
dc.description.validate202402 bcch-
dc.description.oaAccepted Manuscripten_US
dc.identifier.FolderNumberISE-0497-
dc.description.fundingSourceOthersen_US
dc.description.fundingTextNatural Science Foundation of Guangdong Province; National Natural Science Foundation of China; Technology Planning Project from Guangdong Province of China; Science and Technology Plan Projects of Shenzhen; The Hong Kong Polytechnic Universityen_US
dc.description.pubStatusPublisheden_US
dc.identifier.OPUS60284795-
dc.description.oaCategoryGreen (AAM)en_US
Appears in Collections:Journal/Magazine Article
Files in This Item:
File Description SizeFormat 
Yung_Secure_Hash_Function.pdfPre-Published version1.12 MBAdobe PDFView/Open
Open Access Information
Status open access
File Version Final Accepted Manuscript
Access
View full-text via PolyU eLinks SFX Query
Show simple item record

Page views

104
Last Week
4
Last month
Citations as of Nov 30, 2025

Downloads

93
Citations as of Nov 30, 2025

SCOPUSTM   
Citations

15
Citations as of Dec 19, 2025

WEB OF SCIENCETM
Citations

11
Citations as of Dec 18, 2025

Google ScholarTM

Check

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.