Results 131 to 140 of about 555,076 (261)
Cryptographic Hash Functions in Groups and Provable Properties
We consider several "provably secure" hash functions that compute simple sums in a well chosen group (G,*). Security properties of such functions provably translate in a natural way to computational problems in G that are simple to define and possibly also hard to solve.
openaire +2 more sources
Implementation of a Data-Parallel Approach on a Lightweight Hash Function for IoT Devices
The Internet of Things is used in many application areas in our daily lives. Ensuring the security of valuable data transmitted over the Internet is a crucial challenge.
Abdullah Sevin
doaj +1 more source
Skyscraper: Fast Hashing on Big Primes
Arithmetic hash functions defined over prime fields have been actively developed and used in verifiable computation (VC) protocols. Among those, ellipticcurve- based SNARKs require large (256-bit and higher) primes. Such hash functions are notably slow,
Clémence Bouvier+6 more
doaj +1 more source
Building Provably Secure Block Ciphers from Cryptographic Hash Functions
F. Charles
openalex +1 more source
S-HASH: A Crack Towards Cryptographic Hash Functions
Kaushal Jangid, Vidushi
openalex +2 more sources
Comparative Study of Blockchain Hashing Algorithms with a Proposal for HashLEA
Blockchain has several unique features: data integrity, security, privacy, and immutability. For this reason, it is considered one of the most promising new technologies for a wide range of applications.
Abdullah Sevin+1 more
doaj +1 more source
A review of collisions in cryptographic hash function used in digital forensic tools
Z. E. Rasjid+3 more
semanticscholar +1 more source
Improved 2-round collision attack on IoT hash standard ASCON-HASH
Lightweight cryptography algorithms are a class of ciphers designed to protect data generated and transmitted by the Internet of Things. They typically have low requirements in terms of storage space and power consumption, and are well-suited for ...
Di Zhai+4 more
doaj
Scanning and Detection of virus using cryptographic hash function
O Himgouri+4 more
openalex +1 more source