Results 101 to 110 of about 555,076 (261)

GOST 34.11-2018 Analysis in The Context of Zero-Knowledge Proofs

open access: yesБезопасность информационных технологий
Zero-knowledge proofs are being increasingly applied to a wide range of tasks in modern distributed information systems. Of particular interest are such areas of activity as digital asset management systems, anonymous electronic voting systems, and ...
Vladlen D. Afonin   +2 more
doaj   +1 more source

A Cryptographic Hash Function from Markoff Triples

open access: yes, 2021
Cryptographic hash functions from expander graphs were proposed by Charles, Goren, and Lauter in [CGL] based on the hardness of finding paths in the graph. In this paper, we propose a new candidate for a hash function based on the hardness of finding paths in the graph of Markoff triples modulo p.
Fuchs, Elena   +3 more
openaire   +2 more sources

A trapdoor one-way function for verifiable secret sharing

open access: yesHigh-Confidence Computing, 2022
This paper proposes a (t,n)–threshold verifiable secret sharing scheme with changeable parameters based on a trapdoor one-way function. This scheme consists of a generation phase, a distribution phase, an encoding phase and a reconstruction phase.
Ali Kanso, Mohammad Ghebleh
doaj  

HF-hash : Hash Functions Using Restricted HFE Challenge-1 [PDF]

open access: yesarXiv, 2009
Vulnerability of dedicated hash functions to various attacks has made the task of designing hash function much more challenging. This provides us a strong motivation to design a new cryptographic hash function viz. HF-hash. This is a hash function, whose compression function is designed by using first 32 polynomials of HFE Challenge-1 with 64 variables
arxiv  

How to Govern the Confidence Machine?

open access: yesRegulation &Governance, EarlyView.
ABSTRACT Emerging technologies pose many new challenges for regulation and governance on a global scale. With the advent of distributed communication networks like the Internet and decentralized ledger technologies like blockchain, new platforms emerged, disrupting existing power dynamics and bringing about new claims of sovereignty from the private ...
Primavera de Filippi   +2 more
wiley   +1 more source

SHA-1 and the Strict Avalanche Criterion [PDF]

open access: yesarXiv, 2016
The Strict Avalanche Criterion (SAC) is a measure of both confusion and diffusion, which are key properties of a cryptographic hash function. This work provides a working definition of the SAC, describes an experimental methodology that can be used to statistically evaluate whether a cryptographic hash meets the SAC, and uses this to investigate the ...
arxiv  

Towards Automated Augmentation and Instrumentation of Legacy Cryptographic Executables: Extended Version [PDF]

open access: yesarXiv, 2020
Implementation flaws in cryptographic libraries, design flaws in underlying cryptographic primitives, and weaknesses in protocols using both, can all lead to exploitable vulnerabilities in software. Manually fixing such issues is challenging and resource consuming, especially when maintaining legacy software that contains broken or outdated ...
arxiv  

Leveraging Industry 4.0 technologies for sustainable value chains: Raising awareness on digital transformation and responsible operations management

open access: yesSustainable Development, Volume 33, Issue 2, Page 2189-2202, April 2025.
Abstract Practitioners, policy makers as well as scholars are increasingly focusing their attention on the promotion of sustainable practices that reduce the businesses' impacts on the environment. In many cases, they are well aware that manufacturers and their suppliers are resorting to lean management processes and Industry 4.0 (I4.0) technologies ...
Serena Strazzullo   +3 more
wiley   +1 more source

A research on the impact of encryption algorithms on the quality of VPN tunnels’ transmission

open access: yesITM Web of Conferences, 2018
The following article presents the results on the impact of encryption algorithms and the cryptographic hash function on the QoS (Quality of Service) transmission in a computer network.
Strzęciwilk Dariusz   +3 more
doaj   +1 more source

A perceptual hash function to store and retrieve large scale DNA sequences [PDF]

open access: yesarXiv, 2014
This paper proposes a novel approach for storing and retrieving massive DNA sequences.. The method is based on a perceptual hash function, commonly used to determine the similarity between digital images, that we adapted for DNA sequences. Perceptual hash function presented here is based on a Discrete Cosine Transform Sign Only (DCT-SO).
arxiv  

Home - About - Disclaimer - Privacy