Results 111 to 120 of about 555,076 (261)
Security Risks in the Encryption of Database Connection Strings
ABSTRACT Background There exists an important and open problem with the encrypting of database connection strings in that related connection strings start with well known identical initial sub‐strings. When these initial sub‐strings are longer than the encrypting algorithm's block size, the resulting encrypted text for related database connection ...
Ross Rannells, James H. Hill
wiley +1 more source
An Efficient Cryptographic Hash Algorithm (BSA) [PDF]
Recent cryptanalytic attacks have exposed the vulnerabilities of some widely used cryptographic hash functions like MD5 and SHA-1. Attacks in the line of differential attacks have been used to expose the weaknesses of several other hash functions like RIPEMD, HAVAL.
arxiv
Conv-codes: Audio Hashing For Bird Species Classification [PDF]
In this work, we propose a supervised, convex representation based audio hashing framework for bird species classification. The proposed framework utilizes archetypal analysis, a matrix factorization technique, to obtain convex-sparse representations of a bird vocalization.
arxiv
SHA-1 and MD5 Cryptographic Hash Functions: Security Overview [PDF]
Roman Jašek
openalex +1 more source
Automated Quantum Circuit Generation for Computing Inverse Hash Functions [PDF]
Several cryptographic systems depend upon the computational difficulty of reversing cryptographic hash functions. Robust hash functions transform inputs to outputs in such a way that the inputs cannot be later retrieved in a reasonable amount of time even if the outputs and the function that created them are known.
arxiv
On the Concept of Cryptographic Quantum Hashing [PDF]
In the paper we define a notion of quantum resistant ($(\epsilon,\delta)$-resistant) hash function which combine together a notion of pre-image (one-way) resistance ($\epsilon$-resistance) property we define in the paper and the notion of collision resistance ($\delta$-resistance) properties.
arxiv
Performance Analysis of Cryptographic Hash Functions Suitable for Use in Blockchain [PDF]
Alexandr Kuznetsov+5 more
openalex +1 more source
Black-Box Property of Cryptographic Hash Functions [PDF]
We define a new black-box property of cryptographic hash function families H :{0,1}K ×{0,1}*→{0,1}y which guarantees that for a randomly chosen hash function H K from the family, everything "non-trivial" we are able to compute having access to the key K , we can compute only with oracle access to H K . If a hash function family is pseudo-random and has
openaire +2 more sources
Hash Functions and Benchmarks for Resource Constrained Passive Devices: A Preliminary Study [PDF]
Recently, we have witnessed the emergence of intermittently powered computational devices, an early example is the Intel WISP (Wireless Identification and Sensing Platform). How we engineer basic security services to realize mutual authentication, confidentiality and preserve privacy of information collected, stored and transmitted by, and establish ...
arxiv
Blockchain-Based Piecewise Regressive Kupyna Cryptography for Secure Cloud Services
Cloud computing (CC) is a network-based concept where users access data at a specific time and place. The CC comprises servers, storage, databases, networking, software, analytics, and intelligence. Cloud security is the cybersecurity authority dedicated
Selvakumar Shanmugam+5 more
doaj +1 more source