Results 111 to 120 of about 75,969 (261)
A Cryptographic Escrow for Treaty Declarations and Step-by-Step Verification
The verification of arms-control and disarmament agreements requires states to provide declarations, including information on sensitive military sites and assets.
Felten, Edward W.+2 more
core +1 more source
A trapdoor one-way function for verifiable secret sharing
This paper proposes a (t,n)–threshold verifiable secret sharing scheme with changeable parameters based on a trapdoor one-way function. This scheme consists of a generation phase, a distribution phase, an encoding phase and a reconstruction phase.
Ali Kanso, Mohammad Ghebleh
doaj
A research on the impact of encryption algorithms on the quality of VPN tunnels’ transmission
The following article presents the results on the impact of encryption algorithms and the cryptographic hash function on the QoS (Quality of Service) transmission in a computer network.
Strzęciwilk Dariusz+3 more
doaj +1 more source
SHA-1 and MD5 Cryptographic Hash Functions: Security Overview [PDF]
Roman Jašek
openalex +1 more source
Black-Box Property of Cryptographic Hash Functions [PDF]
We define a new black-box property of cryptographic hash function families H :{0,1}K ×{0,1}*→{0,1}y which guarantees that for a randomly chosen hash function H K from the family, everything "non-trivial" we are able to compute having access to the key K , we can compute only with oracle access to H K . If a hash function family is pseudo-random and has
openaire +2 more sources
Pairing-based identification schemes [PDF]
We propose four different identification schemes that make use of bilinear pairings, and prove their security under certain computational assumptions. Each of the schemes is more efficient and/or more secure than any known pairing-based identification ...
Freeman, David
core +2 more sources
Hardware-based Security for Virtual Trusted Platform Modules
Virtual Trusted Platform modules (TPMs) were proposed as a software-based alternative to the hardware-based TPMs to allow the use of their cryptographic functionalities in scenarios where multiple TPMs are required in a single platform, such as in ...
Alsouri, Sami+3 more
core
Mathematical Analysis of The Hash Functions as a Cryptographic Tools for Blockchain
Muharrem Tuncay Gençoğlu
openalex +1 more source
Blockchain-Based Piecewise Regressive Kupyna Cryptography for Secure Cloud Services
Cloud computing (CC) is a network-based concept where users access data at a specific time and place. The CC comprises servers, storage, databases, networking, software, analytics, and intelligence. Cloud security is the cybersecurity authority dedicated
Selvakumar Shanmugam+5 more
doaj +1 more source
How to Formalize Loop Iterations in Cryptographic Protocols Using ProVerif
The formal verification of cryptographic protocols has been extensively studied in recent years. To verify the cryptographic protocol security, formal verification tools consider protocol properties as interactive processes involving a cryptographic ...
Takehiko Mieno+3 more
doaj +1 more source