Results 91 to 100 of about 517,099 (243)

A new design paradigm for provably secure keyless hash function with subsets and two variables polynomial function

open access: yesJournal of King Saud University: Computer and Information Sciences, 2022
Provably secure keyless hash function uses Random Oracle (RO) or Sponge principles for the design and construction of security-centric hash algorithms. It capitalizes the aforesaid principles to produce outcomes like MD2, MD5, SHA-160, SHA-224/256, SHA ...
P. Karthik, P. Shanthi Bala
doaj  

Design of a New Cryptographic Hash Function – Titanium

open access: yesIndonesian Journal of Electrical Engineering and Computer Science, 2018
<span>This paper introduces a new cryptographic hash function that follows sponge construction. Paper begins with outlining the structure of the construction. Next part describes the functionality of Titanium and cipher used. A competition between block cipher and stream cipher is presented and showed the reason of using block cipher rather than ...
openaire   +3 more sources

Design and Analysis of New Version of Cryptographic Hash Function Based on Improved Chaotic Maps With Induced DNA Sequences [PDF]

open access: gold, 2023
Salwa M. Serag Eldin   +7 more
openalex   +1 more source

Design keyed Hash function based on couple chaotic system

open access: yesTongxin xuebao, 2006
Analyzed the chaotic and cryptographic properties of a piecewise nonlinear map, a couple chaotic digital sys-tem was proposed based on perturbing which used the piecewise nonlinear, then a new approach to construct keyed Hash function was presented.
WEI Peng-cheng1   +3 more
doaj   +2 more sources

A Subject-Sensitive Perceptual Hash Based on MUM-Net for the Integrity Authentication of High Resolution Remote Sensing Images

open access: yesISPRS International Journal of Geo-Information, 2020
Data security technology is of great significance to the application of high resolution remote sensing image (HRRS) images. As an important data security technology, perceptual hash overcomes the shortcomings of cryptographic hashing that is not robust ...
Kaimeng Ding   +3 more
doaj   +1 more source

Password Cracking: The Effect of Hash Function Bias on the Average Guesswork [PDF]

open access: yesarXiv, 2016
Modern authentication systems store hashed values of passwords of users using cryptographic hash functions. Therefore, to crack a password an attacker needs to guess a hash function input that is mapped to the hashed value, as opposed to the password itself.
arxiv  

Blockchain technology disruptions: Exploring accounting and auditing academics and practitioners' perception

open access: yesAccounting &Finance, EarlyView.
Abstract This study explores the practical impact of blockchain technology (BCT), which contrasts strongly with literature that has predominantly hypothesised BCT's potential to disrupt accounting practice. We interviewed 44 practitioners and academics with knowledge of BCT across 13 countries and industries.
Musbaudeen Titilope Oladejo   +3 more
wiley   +1 more source

Blockchain of Signature Material Combining Cryptographic Hash Function and DNA Steganography [PDF]

open access: yesarXiv, 2019
An ideal signature material and method, which can be used to prove the authenticity of a physical item and against forgery, should be immune to the fast developments in digital and engineering technologies. Herein, the design of signature material combining cryptographic hash function and DNA steganography is proposed. The encrypting materials are used
arxiv  

OpenSAFELY: The impact of COVID‐19 on azathioprine, leflunomide and methotrexate monitoring, and factors associated with change in monitoring rate

open access: yesBritish Journal of Clinical Pharmacology, EarlyView.
Aims The COVID‐19 pandemic created unprecedented pressure on healthcare services. This study investigates whether disease‐modifying antirheumatic drug (DMARD) safety monitoring was affected during the COVID‐19 pandemic. Methods A population‐based cohort study was conducted using the OpenSAFELY platform to access electronic health record data from 24.2 ...
Andrew D. Brown   +27 more
wiley   +1 more source

Random Bit Generator Mechanism Based on Elliptic Curves and Secure Hash Function [PDF]

open access: yesarXiv, 2020
Pseudorandom bit generators (PRBG) can be designed to take the advantage of some hard number theoretic problems such as the discrete logarithm problem (DLP). Such type of generators will have good randomness and unpredictability properties as it is so difficult to find an easy solution to the regarding mathematical dilemma.
arxiv  

Home - About - Disclaimer - Privacy