STITCH-256: A Dedicated Cryptographic Hash Function
Ramlan Mahmod+4 more
openaire +2 more sources
Post-Quantum Linkable Hash-Based Ring Signature Scheme for Off-Chain Payments in IoT. [PDF]
He L, Zhou X, Cai D, Hu X, Liu S.
europepmc +1 more source
Securing IoMT data with Algorand blockchain, XChaCha20-Poly1305 encryption, and decentralized storage alternatives. [PDF]
K D, P S UP.
europepmc +1 more source
Detecting Cryptographic Hash Functions through Electromagnetic Side-Channel Analysis
Gayan Akmeemana+2 more
openalex +1 more source
Using Cryptographic Hash Functions for Discretionary Access Control in Object-Oriented Databases [PDF]
Ahmad Baraani-Dastjerdi+3 more
openalex +1 more source
A cross-chain model for warehouse receipts in port supply chain based on notary mechanism and ShangMi cryptographic algorithms. [PDF]
Chen Y+5 more
europepmc +1 more source
Analysis of the cryptographic strength of the SHA-256 hash function using the SAT approach
Vadim Davydov+3 more
openalex +1 more source
Federated learning with enhanced cryptographic security for vehicular cyber-physical systems. [PDF]
Babbar H, Rani S, Shabaz M.
europepmc +1 more source
Robust Image Encryption with 2D Hyperchaotic Map and Dynamic DNA-Zigzag Encoding. [PDF]
Zhang H, Liu X, Chen K, Te R, Yan F.
europepmc +1 more source