Results 171 to 180 of about 75,969 (261)

A secure end-to-end communication framework for cooperative IoT networks using hybrid blockchain system. [PDF]

open access: yesSci Rep
Erukala SB   +6 more
europepmc   +1 more source

Cryptanalysis of Dedicated Cryptographic Hash Functions

open access: yes, 2009
In this thesis we study the security of a number of dedicated cryptographic hash functions against cryptanalytic attacks. We begin with an introduction to what cryptographic hash functions are and what they are used for. This is followed by strict definitions of the security properties often required from cryptographic hash functions.
openaire   +1 more source

ANCHOR-Grid: Authenticating Smart Grid Digital Twins Using Real-World Anchors. [PDF]

open access: yesSensors (Basel)
Hatami M   +5 more
europepmc   +1 more source

DNA-Inspired Lightweight Cryptographic Algorithm for Secure and Efficient Image Encryption. [PDF]

open access: yesSensors (Basel)
Abdelaal MA   +5 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy