Results 101 to 110 of about 39,083 (208)

Blockchain-Based Piecewise Regressive Kupyna Cryptography for Secure Cloud Services

open access: yesIET Information Security
Cloud computing (CC) is a network-based concept where users access data at a specific time and place. The CC comprises servers, storage, databases, networking, software, analytics, and intelligence. Cloud security is the cybersecurity authority dedicated
Selvakumar Shanmugam   +5 more
doaj   +1 more source

How to Formalize Loop Iterations in Cryptographic Protocols Using ProVerif

open access: yesIEEE Access
The formal verification of cryptographic protocols has been extensively studied in recent years. To verify the cryptographic protocol security, formal verification tools consider protocol properties as interactive processes involving a cryptographic ...
Takehiko Mieno   +3 more
doaj   +1 more source

Performance Analysis of Cryptographic Hash Functions Suitable for Use in Blockchain [PDF]

open access: gold, 2021
Alexandr Kuznetsov   +5 more
openalex   +1 more source

Lightweight Hash Function Design for the Internet of Things: Structure and SAT-Based Cryptanalysis

open access: yesAlgorithms
This paper introduces a lightweight cryptographic hash algorithm, LWH-128, developed using a sponge-based construction and specifically adapted for operation under constrained computational and energy conditions typical of embedded systems and Internet ...
Kairat Sakan   +3 more
doaj   +1 more source

Development of the Hash Function Using Modified Skew Tent Map to Improve Blockchain Technology

open access: yesIbn Al-Haitham Journal for Pure and Applied Sciences
Using SHA256 in the Blockchain system for security purposes, as it is important in linking blocks and preventing tampering efficiently and securely. In order to further confirm the security of SHA256 and protect it and increase its susceptibility to ...
Raghad Kadhim Salih   +3 more
doaj   +1 more source

Study About the Performance of Ascon in Arduino Devices

open access: yesApplied Sciences
In 2023, the Ascon cipher suite was selected as the winner of the National Institute of Standards and Technology (NIST) standardization process for lightweight cryptography, and has emerged as the leading candidate for cryptographic algorithms in ...
Ventura Sarasa Laborda   +4 more
doaj   +1 more source

Implementation of a Data-Parallel Approach on a Lightweight Hash Function for IoT Devices

open access: yesMathematics
The Internet of Things is used in many application areas in our daily lives. Ensuring the security of valuable data transmitted over the Internet is a crucial challenge.
Abdullah Sevin
doaj   +1 more source

Home - About - Disclaimer - Privacy