Secure Sensitive Data Sharing Using RSA and ElGamal Cryptographic Algorithms with Hash Functions
With the explosion of connected devices linked to one another, the amount of transmitted data grows day by day, posing new problems in terms of information security, such as unauthorized access to users’ credentials and sensitive information.
E. Adeniyi +4 more
semanticscholar +1 more source
Analysis of the amplitude form of the quantum hash function
In this article, the properties of quantum hash functions are further explored. Previous findings show that so-called small-bias sets (special subsets of the set of elements of a cyclic group) generate a “phase” quantum hash function. Here, it was proved
M. F. Ablayev +2 more
doaj +1 more source
Theoretical and Experimental Analysis of Cryptographic Hash Functions
The paper presents a theoretical introduction to the cryptographic hash function theory and a statistical experimental analysis of selected hash functions.
Jacek Tchórzewsk +1 more
doaj +1 more source
High Throughput Implementation of the Keccak Hash Function Using the Nios-II Processor
Presently, cryptographic hash functions play a critical role in many applications, such as digital signature systems, security communications, protocols, and network security infrastructures.
Argyrios Sideris +2 more
doaj +1 more source
A review of collisions in cryptographic hash function used in digital forensic tools
Digital forensic tool is a software used by digital evidence investigators to extract data and information from a digital evidence. The integrity of the digital evidence must be maintained through the chain of custody in order to be admissible in court ...
Z. E. Rasjid +3 more
semanticscholar +1 more source
An application of residue number system arithmetics to secure hash functions design [PDF]
This paper presents a cryptographic hash function based on the Residue Number System (RNS), designed to enhance security and computational efficiency. The function leverages the parallelism and modular properties of RNS to achieve high-speed processing ...
Pavlović Milija +3 more
doaj +1 more source
Reversible and Plausibly Deniable Covert Channels in One-Time Passwords Based on Hash Chains
Covert channels enable stealthy communications over innocent appearing carriers. They are increasingly applied in the network context. However, little work is available that exploits cryptographic primitives in the networking context to establish such ...
Jörg Keller, Steffen Wendzel
doaj +1 more source
Design of a New Cryptographic Hash Function – Titanium
This paper introduces a new cryptographic hash function that follows sponge construction. Paper begins with outlining the structure of the construction. Next part describes the functionality of Titanium and cipher used. A competition between block cipher
M. AlAhmad
semanticscholar +1 more source
Anti-disassembly using Cryptographic Hash Functions [PDF]
Computer viruses sometimes employ coding techniques intended to make analysis difficult for anti-virus researchers; techniques to obscure code to impair static code analysis are called anti-disassembly techniques. We present a new method of anti-disassembly based on cryptographic hash functions which is portable, hard to analyze, and can be used to ...
John Aycock +2 more
openaire +1 more source
JAVASCRIPT SECURITY USING CRYPTOGRAPHIC HASH FUNCTIONS
The subject of this research is the development of methods of protection against attacks on third-party JavaScript and the document object model (DOM). The purpose of the article is to develop an algorithm and determine the effectiveness of using cryptographic hash functions as one of the methods of protection against attacks on third-party JavaScript ...
Rahimova, Irada +3 more
openaire +5 more sources

