Results 91 to 100 of about 45,527 (206)
Study About the Performance of Ascon in Arduino Devices
In 2023, the Ascon cipher suite was selected as the winner of the National Institute of Standards and Technology (NIST) standardization process for lightweight cryptography, and has emerged as the leading candidate for cryptographic algorithms in ...
Ventura Sarasa Laborda +4 more
doaj +1 more source
S-HASH: A Crack Towards Cryptographic Hash Functions
Kaushal Jangid, Vidushi .
openaire +1 more source
Evaluation and design of cryptographic hash functions
Une fonction de hachage est une fonction prenant comme argument un élément de taille arbitraire finie et renvoyant un élément de longueur fixée. Il existe différents types de fonctions de hachage qui correspondent à autant de domaines d'utilisation.
openaire +2 more sources
Analysis of cryptographic hash functions
The National Institute of Standards and Technology (NIST) launched in 2008 a public competition, called the SHA-3 competition, aiming at definining a new standard for hash functions. We study here the algebraic properties of some of the candidates to this contest. Among the functions analyzed, is the Keccak algorithm, which was recently announced to be
openaire +1 more source
A hybrid hash framework for post quantum secure zero knowledge identification. [PDF]
Bhadane S +3 more
europepmc +1 more source
Optimising the SHA-512 cryptographic hash function on FPGAs
G. Athanasiou +3 more
semanticscholar +1 more source
QRBT: Quantum Driven Reinforcement Learning for Scalable Blockchain Transaction Processing. [PDF]
Lella KK, Mallu SRK.
europepmc +1 more source
Anonymous and Efficient Chaotic Map-Based Authentication Protocol for Industrial Internet of Things. [PDF]
Zeng D +6 more
europepmc +1 more source

