Results 91 to 100 of about 40,689 (200)
Fully Integrated Passive UHF RFID Tag for Hash-Based Mutual Authentication Protocol
Passive radio-frequency identification (RFID) tag has been used in many applications. While the RFID market is expected to grow, concerns about security and privacy of the RFID tag should be overcome for the future use.
Shugo Mikami +3 more
doaj +1 more source
GOST 34.11-2018 Analysis in The Context of Zero-Knowledge Proofs
Zero-knowledge proofs are being increasingly applied to a wide range of tasks in modern distributed information systems. Of particular interest are such areas of activity as digital asset management systems, anonymous electronic voting systems, and ...
Vladlen D. Afonin +2 more
doaj +1 more source
An Efficient Signature Scheme From Supersingular Elliptic Curve Isogenies
Since supersingular elliptic curve isogenies are one of the several candidate sources of hardness for building post-quantum cryptographic primitives, the research of efficient signature schemes based on them is still a hot topic.
Yan Huang +3 more
doaj +1 more source
Extended Capabilities for a Privacy-Enhanced Participatory Sensing Infrastructure (PEPSI)
Participatory sensing is emerging as an innovative computing paradigm that targets the ubiquity of always-connected mobile phones and their sensing capabilities.
De Cristofaro, Emiliano +1 more
core +1 more source
A Touch of Evil: High-Assurance Cryptographic Hardware from Untrusted Components [PDF]
The semiconductor industry is fully globalized and integrated circuits (ICs) are commonly defined, designed and fabricated in different premises across the world. This reduces production costs, but also exposes ICs to supply chain attacks, where insiders
Cerulli, Andrea +5 more
core +1 more source
Efficient Negative Databases from Cryptographic Hash Functions [PDF]
A negative database is a privacy-preserving storage system that allows to efficiently test if an entry is present, but makes it hard to enumerate all encoded entries. We improve significantly over previous work presented at ISC 2006 by Esponda et al.
Danezis, George +5 more
openaire +2 more sources
Design keyed Hash function based on couple chaotic system
Analyzed the chaotic and cryptographic properties of a piecewise nonlinear map, a couple chaotic digital sys-tem was proposed based on perturbing which used the piecewise nonlinear, then a new approach to construct keyed Hash function was presented.
WEI Peng-cheng1 +3 more
doaj +2 more sources
Cryptographic Hash Function using Cellular Automata
Since two distinct messages are extremely unlikely to generate identical message digests, one can use this property of cryptographic hash functions to detect when a message has been altered. If one takes a binary file and computes a digest of the file, one can record this baseline digest. In the future, the digest can be recomputed on the file.
openaire +1 more source
MicroCrypt: High-Efficiency Hashing for Next-Generation IoT Devices
The Internet of Things (IoT) is growing quickly and connecting more devices than ever before. This has made it more important to improve security protocols, especially cryptographic hash functions that work in places with limited computing, storage, and ...
Shatha H. Jafer Al-Khalisy +5 more
doaj +1 more source
Cryptographic Hash Functions: Theory and Practice [PDF]
Cryptographic hash functions are an essential building block for security applications. Until 2005, the amount of theoretical research and cryptanalysis invested in this topic was rather limited. From the hundred designs published before 2005, about 80% was cryptanalyzed; this includes widely used hash functions such as MD4 and MD5.
openaire +3 more sources

