Blockchain-based cryptographic framework for secure data transmission in IoT edge environments using ECaps-Net. [PDF]
Mohamed Meerasha I +3 more
europepmc +1 more source
A Post-Quantum Secure RFID Authentication Protocol Based on NTRU Encryption Algorithm. [PDF]
Liu H, Wu H, Ge N, Dong Q.
europepmc +1 more source
Privacy-Preserving ECC-Based AKA for Resource-Constrained IoT Sensor Networks with Forgotten Password Reset. [PDF]
Yu Y, Wei K, Qi K, Wu W.
europepmc +1 more source
An Enhanced Non-Cryptographic Hash Function
Steve Okyere-Gyamfi +2 more
openaire +1 more source
Secure, scalable, and interoperable healthcare data exchange using layer-2 ZK-rollups, smart contracts, and IPFS. [PDF]
Raghav A +5 more
europepmc +1 more source
Non-Cryptographic Hash Functions: Focus on FNV
In this thesis, we will explore the world of hash functions. After a brief overview of the construction and uses of cryptographic hashes, we will then focus almost exclusively on non-cryptographic functions. We delve into the FNV family of hash functions in significant detail, examining their background, structure and motivation. We then introduce some
openaire +1 more source
A Lightweight Authentication and Key Distribution Protocol for XR Glasses Using PUF and Cloud-Assisted ECC. [PDF]
Cha W, Lee HJ, Kook S, Kim K, Won D.
europepmc +1 more source
Cryptographic hash function SafeBK
openaire +1 more source
Cryptanalysis of Dedicated Cryptographic Hash Functions
In this thesis we study the security of a number of dedicated cryptographic hash functions against cryptanalytic attacks. We begin with an introduction to what cryptographic hash functions are and what they are used for. This is followed by strict definitions of the security properties often required from cryptographic hash functions.
openaire +1 more source
Lightweight three-factor authentication protocol for 6G-enabled healthcare systems using Chebyshev chaotic maps and BioHashing. [PDF]
Abbas AM, Nasr ME, Abdelfatah RI.
europepmc +1 more source

