Results 91 to 100 of about 517,099 (243)
Provably secure keyless hash function uses Random Oracle (RO) or Sponge principles for the design and construction of security-centric hash algorithms. It capitalizes the aforesaid principles to produce outcomes like MD2, MD5, SHA-160, SHA-224/256, SHA ...
P. Karthik, P. Shanthi Bala
doaj
Design of a New Cryptographic Hash Function – Titanium
<span>This paper introduces a new cryptographic hash function that follows sponge construction. Paper begins with outlining the structure of the construction. Next part describes the functionality of Titanium and cipher used. A competition between block cipher and stream cipher is presented and showed the reason of using block cipher rather than ...
openaire +3 more sources
Design and Analysis of New Version of Cryptographic Hash Function Based on Improved Chaotic Maps With Induced DNA Sequences [PDF]
Salwa M. Serag Eldin+7 more
openalex +1 more source
Design keyed Hash function based on couple chaotic system
Analyzed the chaotic and cryptographic properties of a piecewise nonlinear map, a couple chaotic digital sys-tem was proposed based on perturbing which used the piecewise nonlinear, then a new approach to construct keyed Hash function was presented.
WEI Peng-cheng1+3 more
doaj +2 more sources
Data security technology is of great significance to the application of high resolution remote sensing image (HRRS) images. As an important data security technology, perceptual hash overcomes the shortcomings of cryptographic hashing that is not robust ...
Kaimeng Ding+3 more
doaj +1 more source
Password Cracking: The Effect of Hash Function Bias on the Average Guesswork [PDF]
Modern authentication systems store hashed values of passwords of users using cryptographic hash functions. Therefore, to crack a password an attacker needs to guess a hash function input that is mapped to the hashed value, as opposed to the password itself.
arxiv
Abstract This study explores the practical impact of blockchain technology (BCT), which contrasts strongly with literature that has predominantly hypothesised BCT's potential to disrupt accounting practice. We interviewed 44 practitioners and academics with knowledge of BCT across 13 countries and industries.
Musbaudeen Titilope Oladejo+3 more
wiley +1 more source
Blockchain of Signature Material Combining Cryptographic Hash Function and DNA Steganography [PDF]
An ideal signature material and method, which can be used to prove the authenticity of a physical item and against forgery, should be immune to the fast developments in digital and engineering technologies. Herein, the design of signature material combining cryptographic hash function and DNA steganography is proposed. The encrypting materials are used
arxiv
Aims The COVID‐19 pandemic created unprecedented pressure on healthcare services. This study investigates whether disease‐modifying antirheumatic drug (DMARD) safety monitoring was affected during the COVID‐19 pandemic. Methods A population‐based cohort study was conducted using the OpenSAFELY platform to access electronic health record data from 24.2 ...
Andrew D. Brown+27 more
wiley +1 more source
Random Bit Generator Mechanism Based on Elliptic Curves and Secure Hash Function [PDF]
Pseudorandom bit generators (PRBG) can be designed to take the advantage of some hard number theoretic problems such as the discrete logarithm problem (DLP). Such type of generators will have good randomness and unpredictability properties as it is so difficult to find an easy solution to the regarding mathematical dilemma.
arxiv