Results 131 to 140 of about 555,076 (261)

Cryptographic Hash Functions in Groups and Provable Properties

open access: yes, 2011
We consider several "provably secure" hash functions that compute simple sums in a well chosen group (G,*). Security properties of such functions provably translate in a natural way to computational problems in G that are simple to define and possibly also hard to solve.
openaire   +2 more sources

Implementation of a Data-Parallel Approach on a Lightweight Hash Function for IoT Devices

open access: yesMathematics
The Internet of Things is used in many application areas in our daily lives. Ensuring the security of valuable data transmitted over the Internet is a crucial challenge.
Abdullah Sevin
doaj   +1 more source

Skyscraper: Fast Hashing on Big Primes

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
Arithmetic hash functions defined over prime fields have been actively developed and used in verifiable computation (VC) protocols. Among those, ellipticcurve- based SNARKs require large (256-bit and higher) primes. Such hash functions are notably slow,
ClĂ©mence Bouvier   +6 more
doaj   +1 more source

Comparative Study of Blockchain Hashing Algorithms with a Proposal for HashLEA

open access: yesApplied Sciences
Blockchain has several unique features: data integrity, security, privacy, and immutability. For this reason, it is considered one of the most promising new technologies for a wide range of applications.
Abdullah Sevin   +1 more
doaj   +1 more source

A review of collisions in cryptographic hash function used in digital forensic tools

open access: yesInternational Conference on Computer Science and Computational Intelligence, 2017
Z. E. Rasjid   +3 more
semanticscholar   +1 more source

Improved 2-round collision attack on IoT hash standard ASCON-HASH

open access: yesHeliyon
Lightweight cryptography algorithms are a class of ciphers designed to protect data generated and transmitted by the Internet of Things. They typically have low requirements in terms of storage space and power consumption, and are well-suited for ...
Di Zhai   +4 more
doaj  

Scanning and Detection of virus using cryptographic hash function

open access: bronze, 2023
O Himgouri   +4 more
openalex   +1 more source

Home - About - Disclaimer - Privacy