Results 1 to 10 of about 45,527 (206)
Finding Bugs in Cryptographic Hash Function Implementations. [PDF]
Cryptographic hash functions are security-critical algorithms with many practical applications, notably in digital signatures. Developing an approach to test them can be particularly difficult, and bugs can remain unnoticed for many years. We revisit the NIST hash function competition, which was used to develop the SHA-3 standard, and apply a new ...
Mouha N, Raunak MS, Kuhn DR, Kacker R.
europepmc +4 more sources
Lightweight Cryptographic Hash Functions: Design Trends, Comparative Study, and Future Directions
The emergence of the Internet of Things (IoT) has enabled billions of devices that collect large amounts of data to be connected. Therefore, IoT security has fundamental requirements. One critical aspect of IoT security is data integrity.
Susila Windarta +4 more
doaj +2 more sources
Data Integrity is one of the primary concepts in information security. The main task of the cryptographic hash function is to assure the integrity of the transmitted data.
Mishal Almazrooie +5 more
doaj +2 more sources
A chaotic parallel hash engine with dynamic stochastic diffusion for blockchain and cloud security [PDF]
The design of cryptographic hash functions is crucial for ensuring the security of digital information. In this context, cellular automata (CAs) have emerged as a promising tool due to their inherent parallelism, determinism, and simplicity.
Qianyun Wang +5 more
doaj +2 more sources
Security Analysis of LNMNT-LightWeight Crypto Hash Function for IoT
Conventional cryptographic techniques are inappropriate for resource-constrained applications in the Internet of Things (IoT) domain because of their high resources requirement.
Nubila Nabeel +2 more
doaj +2 more sources
Whirlwind: a new cryptographic hash function [PDF]
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Barreto, Paulo +4 more
openaire +4 more sources
HashâOne: a lightweight cryptographic hash function
The increased demand for lightweight applications has triggered the need for appropriate security mechanisms in them. Lightweight cryptographic hash functions are among the major responses toward such a requirement. The authors thus have a handful of such hash functions such as QUARK, PHOTON, SPONGENT and GLUON introduced already.
Puliparambil Megha Mukundan +3 more
openaire +2 more sources
A secure and efficient cryptographic hash function based on NewFORK-256
Cryptographic hash functions serve as a fundamental building block of information security and are used in numerous security applications and protocols such as digital signature schemes, construction of MAC and random number generation, for ensuring data
Harshvardhan Tiwari, Krishna Asawa
doaj +2 more sources
A Lightweight Hash-Based Blockchain Architecture for Industrial IoT
Blockchain is a technology that can ensure data integrity in a distributed network, and it is actively applied in various fields. Recently, blockchain is gaining attention due to combining with the Internet of Things (IoT) technology in the industrial ...
Byoungjin Seok +2 more
exaly +3 more sources
One of the first and most used hashing algorithms in blockchains is SHA-256 so the main aim of this paper is how to increase the security level of the blockchain based on the increasing hashing algorithm security.
S. M. Eldin +7 more
semanticscholar +1 more source

