Results 91 to 100 of about 39,083 (208)

StorjLedger: An Innovative Distributed Storage Ecosystem That Overcomes Blockchain Trade‐Offs Using Erasure‐Coded Sharding and Proof‐of‐Storage Consensus

open access: yesEngineering Reports, Volume 7, Issue 10, October 2025.
StorjLedger leverages erasure‐coded sharding and Proof‐of‐Storage to deliver nearly 1000 transactions per second with sub‐second latency, 98% data redundancy, and 76% lower storage costs, resolving the blockchain trilemma by harmonizing scalability, security, and decentralization.
Saha Reno, Koushik Roy
wiley   +1 more source

Improved 2-round collision attack on IoT hash standard ASCON-HASH

open access: yesHeliyon
Lightweight cryptography algorithms are a class of ciphers designed to protect data generated and transmitted by the Internet of Things. They typically have low requirements in terms of storage space and power consumption, and are well-suited for ...
Di Zhai   +4 more
doaj   +1 more source

Reducing Power of BLAKE3 implementations with dedicated FPGA resources [PDF]

open access: yesInternational Journal of Electronics and Telecommunications
The BLAKE cryptographic hash functions are efficiently expressed in software; however, their hardware implementations do not match the speed and power efficiency of alternative methods.
Jarosław Sugier
doaj   +1 more source

RDHNet: Reversible Data Hiding Method for Securing Colour Images Using AlexNet and Watershed Transform in a Fusion Domain

open access: yesCAAI Transactions on Intelligence Technology, Volume 10, Issue 5, Page 1422-1445, October 2025.
ABSTRACT Medical images play a crucial role in diagnosis, treatment procedures and overall healthcare. Nevertheless, they also pose substantial risks to patient confidentiality and safety. Safeguarding the confidentiality of patients' data has become an urgent and practical concern.
Mohamed Meselhy Eltoukhy   +3 more
wiley   +1 more source

Year 2010 Issues on Cryptographic Algorithms [PDF]

open access: yes
In the financial sector, cryptographic algorithms are used as fundamental techniques for assuring confidentiality and integrity of data used in financial transactions and for authenticating entities involved in the transactions.
Masashi Une, Masayuki Kanda
core  

A research on the impact of encryption algorithms on the quality of VPN tunnels’ transmission

open access: yesITM Web of Conferences, 2018
The following article presents the results on the impact of encryption algorithms and the cryptographic hash function on the QoS (Quality of Service) transmission in a computer network.
Strzęciwilk Dariusz   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy