Results 21 to 30 of about 75,969 (261)

Hyperchaotic hashing: a chaotic hash function based on 2D linear cross-coupled map with parallel feedback structure [PDF]

open access: yesScientific Reports
Chaotic systems have been widely employed in constructing hash functions because of their nonlinear characteristics. Nonetheless, some chaotic hash functions are intricately designed, significantly increasing their computational overhead, and some can ...
Hao Xing   +4 more
doaj   +2 more sources

Cryptographic Hash Functions: Theory and Practice [PDF]

open access: green, 2010
Cryptographic hash functions are an essential building block for security applications. Until 2005, the amount of theoretical research and cryptanalysis invested in this topic was rather limited. From the hundred designs published before 2005, about 80% was cryptanalyzed; this includes widely used hash functions such as MD4 and MD5.
Bart Preneel
openalex   +5 more sources

An Enhanced Non-Cryptographic Hash Function

open access: goldInternational Journal of Computer Applications, 2020
Vivian Akoto-Adjepong   +2 more
openalex   +3 more sources

SMASH – A Cryptographic Hash Function [PDF]

open access: bronze, 2005
This paper presents a new hash function design, which is different from the popular designs of the MD4-family. Seen in the light of recent attacks on MD4, MD5, SHA-0, SHA-1, and on RIPEMD, there is a need to consider other hash function design strategies. The paper presents also a concrete hash function design named SMASH.
Lars R. Knudsen
openalex   +4 more sources

Implementation and Optimization of Zero-Knowledge Proof Circuit Based on Hash Function SM3

open access: yesSensors, 2022
With the increasing demand for privacy protection in the blockchain, the universal zero-knowledge proof protocol has been developed and widely used. Because hash function is an important cryptographic primitive in a blockchain, the zero-knowledge proof ...
Yang Yang   +7 more
doaj   +1 more source

Anti-disassembly using Cryptographic Hash Functions [PDF]

open access: greenJournal in Computer Virology, 2006
Computer viruses sometimes employ coding techniques intended to make analysis difficult for anti-virus researchers; techniques to obscure code to impair static code analysis are called anti-disassembly techniques. We present a new method of anti-disassembly based on cryptographic hash functions which is portable, hard to analyze, and can be used to ...
John Aycock   +2 more
openalex   +3 more sources

User privacy prevention model using supervised federated learning‐based block chain approach for internet of Medical Things

open access: yesCAAI Transactions on Intelligence Technology, EarlyView., 2023
Abstract This research focuses on addressing the privacy issues in healthcare advancement monitoring with the rapid establishment of the decentralised communication system in the Internet of Medical Things (IoMT). An integrated blockchain homomorphic encryption standard with an in‐build supervised learning‐based smart contract is designed to improvise ...
Chandramohan Dhasarathan   +7 more
wiley   +1 more source

Developing a New Collision-Resistant Hashing Algorithm

open access: yesMathematics, 2022
Today, cryptographic hash functions have numerous applications in different areas. At the same time, new collision attacks have been developed recently, making some widely used algorithms like SHA-1 vulnerable and unreliable.
Larissa V. Cherckesova   +3 more
doaj   +1 more source

A Novel Hardware Architecture for Enhancing the Keccak Hash Function in FPGA Devices

open access: yesInf., 2023
Hash functions are an essential mechanism in today’s world of information security. It is common practice to utilize them for storing and verifying passwords, developing pseudo-random sequences, and deriving keys for various applications, including ...
Argyrios Sideris   +2 more
semanticscholar   +1 more source

Performance analysis of energy efficient improved LEACH protocol in IoT networks

open access: yesIET Communications, EarlyView., 2022
Abstract The Internet of Things incorporates embedded technologies, wireless sensor networks, control and automation technologies, and wearable devices to enable integrated buildings, enterprises, intelligent homes, and wearable devices. Because sensor nodes have limited power, the energy consumption of the Internet of Things network is critical.
Surbhi Bhatia   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy