Results 111 to 120 of about 40,689 (200)

Year 2010 Issues on Cryptographic Algorithms [PDF]

open access: yes
In the financial sector, cryptographic algorithms are used as fundamental techniques for assuring confidentiality and integrity of data used in financial transactions and for authenticating entities involved in the transactions.
Masashi Une, Masayuki Kanda
core  

Development of the Hash Function Using Modified Skew Tent Map to Improve Blockchain Technology

open access: yesIbn Al-Haitham Journal for Pure and Applied Sciences
Using SHA256 in the Blockchain system for security purposes, as it is important in linking blocks and preventing tampering efficiently and securely. In order to further confirm the security of SHA256 and protect it and increase its susceptibility to ...
Raghad Kadhim Salih   +3 more
doaj   +1 more source

S-HASH: A Crack Towards Cryptographic Hash Functions

open access: yesCSVTU Research Journal on Engineering and Technology, 2021
Kaushal Jangid, Vidushi .
openaire   +1 more source

Evaluation and design of cryptographic hash functions

open access: yes, 2010
Une fonction de hachage est une fonction prenant comme argument un élément de taille arbitraire finie et renvoyant un élément de longueur fixée. Il existe différents types de fonctions de hachage qui correspondent à autant de domaines d'utilisation.
openaire   +2 more sources

Analysis of cryptographic hash functions

open access: yes, 2012
The National Institute of Standards and Technology (NIST) launched in 2008 a public competition, called the SHA-3 competition, aiming at definining a new standard for hash functions. We study here the algebraic properties of some of the candidates to this contest. Among the functions analyzed, is the Keccak algorithm, which was recently announced to be
openaire   +1 more source

Securing internet of things devices using a hybrid approach. [PDF]

open access: yesSci Rep
Jenny RS   +9 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy