Results 1 to 10 of about 3,302 (195)

A chaotic parallel hash engine with dynamic stochastic diffusion for blockchain and cloud security [PDF]

open access: yesScientific Reports
The design of cryptographic hash functions is crucial for ensuring the security of digital information. In this context, cellular automata (CAs) have emerged as a promising tool due to their inherent parallelism, determinism, and simplicity.
Qianyun Wang   +5 more
doaj   +2 more sources

A secure and efficient cryptographic hash function based on NewFORK-256

open access: goldEgyptian Informatics Journal, 2012
Cryptographic hash functions serve as a fundamental building block of information security and are used in numerous security applications and protocols such as digital signature schemes, construction of MAC and random number generation, for ensuring data
Harshvardhan Tiwari, Krishna Asawa
doaj   +2 more sources

Lightweight Cryptographic Hash Functions: Design Trends, Comparative Study, and Future Directions

open access: yesIEEE Access, 2022
The emergence of the Internet of Things (IoT) has enabled billions of devices that collect large amounts of data to be connected. Therefore, IoT security has fundamental requirements. One critical aspect of IoT security is data integrity.
Susila Windarta   +4 more
doaj   +1 more source

Hash Algorithm In Verification Of Certificate Data Integrity And Security

open access: yesAptisi Transactions on Technopreneurship, 2021
The hash function is the most important cryptographic primitive function and is an integral part of the blockchain data structure. Hashes are often used in cryptographic protocols, information security applications such as Digital Signatures and message ...
Muhammad Rehan Anwar   +2 more
doaj   +1 more source

Implementation and Optimization of Zero-Knowledge Proof Circuit Based on Hash Function SM3

open access: yesSensors, 2022
With the increasing demand for privacy protection in the blockchain, the universal zero-knowledge proof protocol has been developed and widely used. Because hash function is an important cryptographic primitive in a blockchain, the zero-knowledge proof ...
Yang Yang   +7 more
doaj   +1 more source

Developing a New Collision-Resistant Hashing Algorithm

open access: yesMathematics, 2022
Today, cryptographic hash functions have numerous applications in different areas. At the same time, new collision attacks have been developed recently, making some widely used algorithms like SHA-1 vulnerable and unreliable.
Larissa V. Cherckesova   +3 more
doaj   +1 more source

Security Analysis of LNMNT-LightWeight Crypto Hash Function for IoT

open access: yesIEEE Access, 2021
Conventional cryptographic techniques are inappropriate for resource-constrained applications in the Internet of Things (IoT) domain because of their high resources requirement.
Nubila Nabeel   +2 more
doaj   +1 more source

Merkle-Damgård Construction Method and Alternatives: A Review

open access: yesJournal of Information and Organizational Sciences, 2017
Cryptographic hash function is an important cryptographic tool in the field of information security. Design of most widely used hash functions such as MD5 and SHA-1 is based on the iterations of compression function by Merkle-Damgård construction method ...
Harshvardhan Tiwari
doaj   +1 more source

FPGA-Based Lightweight Hardware Architecture of the PHOTON Hash Function for IoT Edge Devices

open access: yesIEEE Access, 2020
The design of cryptographic engines for the Internet of Things (IoT) edge devices and other ultralightweight devices is a crucial challenge. The emergence of such resource-constrained devices raises significant challenges to current cryptographic ...
Mohammed Omar Awadh Al-Shatari   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy