Experiment: Hash Functions with Parameters in the Cryptographic Message Syntax (CMS) and S/MIME [PDF]
Jim Schaad
openalex +1 more source
A Deep Cryptographic Framework for Securing the Healthcare Network from Penetration. [PDF]
Singh A+3 more
europepmc +1 more source
Instruction Set Extensions for Cryptographic Hash Functions on a Microcontroller Architecture [PDF]
Jeremy Constantin+2 more
openalex +1 more source
STITCH-256: A Dedicated Cryptographic Hash Function
Ramlan Mahmod+4 more
openaire +2 more sources
An efficient ECC and fuzzy verifier based user authentication protocol for IoT enabled WSNs. [PDF]
Sudhakar T, Praveen R, Natarajan V.
europepmc +1 more source
Enhanced lightweight and compromised-resilient image encryption for resource constrained environments. [PDF]
Mehmood A+5 more
europepmc +1 more source
Provably secure and lightweight blockchain based cross hospital authentication scheme for IoMT-based healthcare. [PDF]
Xie Q, Ding Z.
europepmc +1 more source
Empowering Privacy Through Peer-Supervised Self-Sovereign Identity: Integrating Zero-Knowledge Proofs, Blockchain Oversight, and Peer Review Mechanism. [PDF]
Liu J, Liang Z, Lyu Q.
europepmc +1 more source
A Dickson polynomial based group key agreement authentication scheme for ensuring conditional privacy preservation and traceability in VANETs. [PDF]
Rajkumar Y, Santhosh Kumar SVN.
europepmc +1 more source
Cryptanalysis of Dedicated Cryptographic Hash Functions
In this thesis we study the security of a number of dedicated cryptographic hash functions against cryptanalytic attacks. We begin with an introduction to what cryptographic hash functions are and what they are used for. This is followed by strict definitions of the security properties often required from cryptographic hash functions.
openaire +1 more source