Results 21 to 30 of about 552,535 (268)

Cryptographic Hash Functions from Expander Graphs [PDF]

open access: bronzeJournal of Cryptology, 2007
We propose constructing provable collision resistant hash functions from expander graphs in which finding cycles is hard. As examples, we investigate two specific families of optimal expander graphs for provable collision resistant hash function constructions: the families of Ramanujan graphs constructed by Lubotzky-Phillips-Sarnak and Pizer ...
Denis Charles   +2 more
openalex   +3 more sources

Automated Quantum Circuit Generation for Computing Inverse Hash Functions [PDF]

open access: yesarXiv
Several cryptographic systems depend upon the computational difficulty of reversing cryptographic hash functions. Robust hash functions transform inputs to outputs in such a way that the inputs cannot be later retrieved in a reasonable amount of time even if the outputs and the function that created them are known.
Henderson, Elena R.   +3 more
arxiv   +2 more sources

A Survey: Cryptographic Hash Functions for Digital Stamping

open access: bronzeJournal of Southwest Jiaotong University, 2019
The current study aims to examine a general overview of the application of hash functions in cryptography and study the relationships between cryptographic hash functions and uses of the digital signature. Functions of the cryptographic hash are an important tool applied in several sections of data security, and application of hash function is common ...
Israa Ezzat Salem   +2 more
openalex   +3 more sources

Hyperchaotic hashing: a chaotic hash function based on 2D linear cross-coupled map with parallel feedback structure [PDF]

open access: yesScientific Reports
Chaotic systems have been widely employed in constructing hash functions because of their nonlinear characteristics. Nonetheless, some chaotic hash functions are intricately designed, significantly increasing their computational overhead, and some can ...
Hao Xing   +4 more
doaj   +2 more sources

An Enhanced Non-Cryptographic Hash Function

open access: goldInternational Journal of Computer Applications, 2020
Vivian Akoto-Adjepong   +2 more
openalex   +3 more sources

Lightweight Cryptographic Hash Functions: Design Trends, Comparative Study, and Future Directions

open access: yesIEEE Access, 2022
The emergence of the Internet of Things (IoT) has enabled billions of devices that collect large amounts of data to be connected. Therefore, IoT security has fundamental requirements. One critical aspect of IoT security is data integrity.
Susila Windarta   +4 more
doaj   +1 more source

Implementation and Optimization of Zero-Knowledge Proof Circuit Based on Hash Function SM3

open access: yesSensors, 2022
With the increasing demand for privacy protection in the blockchain, the universal zero-knowledge proof protocol has been developed and widely used. Because hash function is an important cryptographic primitive in a blockchain, the zero-knowledge proof ...
Yang Yang   +7 more
doaj   +1 more source

Blockchain for the circular economy: Theorizing blockchain's role in the transition to a circular economy through an empirical investigation

open access: yesBusiness Strategy and the Environment, Volume 31, Issue 8, Page 3786-3801, December 2022., 2022
Abstract Blockchain is increasingly lauded as an enabler of the transition to a circular economy. While there is considerable conceptual research and some empirical studies on this phenomenon, scholars have yet to develop a theoretical model of blockchain's role in this transition.
Moritz Böhmecke‐Schwafert   +2 more
wiley   +1 more source

An optimized 128-bit cellular automata-based hash function for authentication of data at rest and in transit [PDF]

open access: yes, 2023
The cryptographic hash functions are the most fundamental cryptographic concept. These functions are used as basic building blocks for digital signatures and message authentication. Boolean functions are the core of hash functions.
Mohanty, Suneeta   +2 more
core   +3 more sources

User privacy prevention model using supervised federated learning‐based block chain approach for internet of Medical Things

open access: yesCAAI Transactions on Intelligence Technology, EarlyView., 2023
Abstract This research focuses on addressing the privacy issues in healthcare advancement monitoring with the rapid establishment of the decentralised communication system in the Internet of Medical Things (IoMT). An integrated blockchain homomorphic encryption standard with an in‐build supervised learning‐based smart contract is designed to improvise ...
Chandramohan Dhasarathan   +7 more
wiley   +1 more source

Home - About - Disclaimer - Privacy