Results 11 to 20 of about 45,527 (206)
Cryptographic Hash Functions: [PDF]
Cryptographic hash functions are an important tool of cryptography and play a fundamental role in efficient and secure information processing. A hash function processes an arbitrary finite length input message to a fixed length output referred to as the hash value.
Kan YASUDA, Yu SASAKI
openaire +4 more sources
Hash Algorithm In Verification Of Certificate Data Integrity And Security
The hash function is the most important cryptographic primitive function and is an integral part of the blockchain data structure. Hashes are often used in cryptographic protocols, information security applications such as Digital Signatures and message ...
Muhammad Rehan Anwar +2 more
doaj +1 more source
Abstract This research focuses on addressing the privacy issues in healthcare advancement monitoring with the rapid establishment of the decentralised communication system in the Internet of Medical Things (IoMT). An integrated blockchain homomorphic encryption standard with an in‐build supervised learning‐based smart contract is designed to improvise ...
Chandramohan Dhasarathan +7 more
wiley +1 more source
Implementation and Optimization of Zero-Knowledge Proof Circuit Based on Hash Function SM3
With the increasing demand for privacy protection in the blockchain, the universal zero-knowledge proof protocol has been developed and widely used. Because hash function is an important cryptographic primitive in a blockchain, the zero-knowledge proof ...
Yang Yang +7 more
doaj +1 more source
Synonym‐based multi‐keyword ranked search with secure k‐NN in 6G network
Abstract Sixth Generation (6G) integrates the next generation communication systems such as maritime, terrestrial, and aerial to offer robust network and massive device connectivity with ultra‐low latency requirement. The cutting edge technologies such as artificial intelligence, quantum machine learning, and millimetre enable hyper‐connectivity to ...
Deebak Bakkiam David, Fadi Al‐Turjman
wiley +1 more source
Developing a New Collision-Resistant Hashing Algorithm
Today, cryptographic hash functions have numerous applications in different areas. At the same time, new collision attacks have been developed recently, making some widely used algorithms like SHA-1 vulnerable and unreliable.
Larissa V. Cherckesova +3 more
doaj +1 more source
A Novel Hardware Architecture for Enhancing the Keccak Hash Function in FPGA Devices
Hash functions are an essential mechanism in today’s world of information security. It is common practice to utilize them for storing and verifying passwords, developing pseudo-random sequences, and deriving keys for various applications, including ...
Argyrios Sideris +2 more
semanticscholar +1 more source
Merkle-Damgård Construction Method and Alternatives: A Review
Cryptographic hash function is an important cryptographic tool in the field of information security. Design of most widely used hash functions such as MD5 and SHA-1 is based on the iterations of compression function by Merkle-Damgård construction method ...
Harshvardhan Tiwari
doaj +1 more source
FPGA-Based Lightweight Hardware Architecture of the PHOTON Hash Function for IoT Edge Devices
The design of cryptographic engines for the Internet of Things (IoT) edge devices and other ultralightweight devices is a crucial challenge. The emergence of such resource-constrained devices raises significant challenges to current cryptographic ...
Mohammed Omar Awadh Al-Shatari +4 more
doaj +1 more source
Verification of Implementations of Cryptographic Hash Functions
Cryptographic hash functions have become the basis of modern network computing for identity authorization and secure computing; protocol consistency of cryptographic hash functions is one of the most important properties that affect the security and ...
Dexi Wang +5 more
doaj +1 more source

