Results 91 to 100 of about 39,083 (208)
StorjLedger leverages erasure‐coded sharding and Proof‐of‐Storage to deliver nearly 1000 transactions per second with sub‐second latency, 98% data redundancy, and 76% lower storage costs, resolving the blockchain trilemma by harmonizing scalability, security, and decentralization.
Saha Reno, Koushik Roy
wiley +1 more source
Improved 2-round collision attack on IoT hash standard ASCON-HASH
Lightweight cryptography algorithms are a class of ciphers designed to protect data generated and transmitted by the Internet of Things. They typically have low requirements in terms of storage space and power consumption, and are well-suited for ...
Di Zhai +4 more
doaj +1 more source
Reducing Power of BLAKE3 implementations with dedicated FPGA resources [PDF]
The BLAKE cryptographic hash functions are efficiently expressed in software; however, their hardware implementations do not match the speed and power efficiency of alternative methods.
Jarosław Sugier
doaj +1 more source
ABSTRACT Medical images play a crucial role in diagnosis, treatment procedures and overall healthcare. Nevertheless, they also pose substantial risks to patient confidentiality and safety. Safeguarding the confidentiality of patients' data has become an urgent and practical concern.
Mohamed Meselhy Eltoukhy +3 more
wiley +1 more source
SHA-1 and MD5 Cryptographic Hash Functions: Security Overview [PDF]
Roman Jašek
openalex +1 more source
Mathematical Analysis of The Hash Functions as a Cryptographic Tools for Blockchain
Muharrem Tuncay Gençoğlu
openalex +1 more source
Year 2010 Issues on Cryptographic Algorithms [PDF]
In the financial sector, cryptographic algorithms are used as fundamental techniques for assuring confidentiality and integrity of data used in financial transactions and for authenticating entities involved in the transactions.
Masashi Une, Masayuki Kanda
core
A Novel Approach to Increase Security in AODV Using RSA Asymmetric Cryptography and Hash Function [PDF]
Utkarsh Mendevell
openalex +1 more source
Inverting Cryptographic Hash Functions via Cube-and-Conquer
Oleg Zaikin
openalex +2 more sources
A research on the impact of encryption algorithms on the quality of VPN tunnels’ transmission
The following article presents the results on the impact of encryption algorithms and the cryptographic hash function on the QoS (Quality of Service) transmission in a computer network.
Strzęciwilk Dariusz +3 more
doaj +1 more source

