Results 41 to 50 of about 38,860 (244)

Remote booting in a hostile world: to whom am I speaking? [Computer security] [PDF]

open access: yes, 1995
“This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders.
Christianson, B., Lomas, M.
core   +1 more source

Construction and Analysis of SHA-256 Compression Function Based on Chaos S-Box

open access: yesIEEE Access, 2021
To further improve the security of SHA-256, a compression function construction scheme based on chaotic S-box is proposed. Through the reasonable design of the iteration mode and using the nonlinearity, confusion, and anti-difference of chaotic S-box ...
Juan Wang, Ge Liu, Yongqi Chen, Shu Wang
doaj   +1 more source

Hash‐One: a lightweight cryptographic hash function

open access: yesIET Information Security, 2016
The increased demand for lightweight applications has triggered the need for appropriate security mechanisms in them. Lightweight cryptographic hash functions are among the major responses toward such a requirement. The authors thus have a handful of such hash functions such as QUARK, PHOTON, SPONGENT and GLUON introduced already.
Chungath Srinivasan   +3 more
openaire   +2 more sources

Performance of the most common non-cryptographic hash functions [PDF]

open access: yesSoftware: Practice and Experience, 2013
Non-cryptographic hash functions (NCHFs) have an immense number of applications, ranging from compilers and databases to videogames and computer networks. Some of the most important NCHF have been used by major corporations in commercial products. This practical success demonstrates the ability of hashing systems to provide extremely efficient searches
Estébanez, César   +3 more
openaire   +3 more sources

Cryptographic hash functions for image processing [PDF]

open access: yes, 2021
In this paper, a novel algorithm based on hash function for image cryptography is proposed. In this algorithm, the key idea is to encrypt half of the image using data from the second half of the image and then apply it to each other. This scheme can achieve high sensitivity, high complexity, and high security.
openaire   +1 more source

ON THE UNIVERSAL TREE MODE OF HASH CODE GENERATION

open access: yesСовременные информационные технологии и IT-образование, 2018
Classical approaches to the construction of hash function modes, based on the using of iterative procedures, do not allow efficient processing of large amounts of data and can’t be adapted to parallel computing architectures.
Dmitriy S. Bogdanov   +2 more
doaj   +1 more source

A new design paradigm for provably secure keyless hash function with subsets and two variables polynomial function

open access: yesJournal of King Saud University: Computer and Information Sciences, 2022
Provably secure keyless hash function uses Random Oracle (RO) or Sponge principles for the design and construction of security-centric hash algorithms. It capitalizes the aforesaid principles to produce outcomes like MD2, MD5, SHA-160, SHA-224/256, SHA ...
P. Karthik, P. Shanthi Bala
doaj   +1 more source

Bad Directions in Cryptographic Hash Functions

open access: yes, 2015
A 25-gigabyte “point obfuscation” challenge “using security parameter 60” was announced at the Crypto 2014 rump session; “point obfuscation” is another name for password hashing. This paper shows that the particular matrix-multiplication hash function used in the challenge is much less secure than previous password-hashing functions are believed to be.
Daniel J. Bernstein   +4 more
openaire   +4 more sources

ClaimChain: Improving the Security and Privacy of In-band Key Distribution for Messaging [PDF]

open access: yes, 2018
The social demand for email end-to-end encryption is barely supported by mainstream service providers. Autocrypt is a new community-driven open specification for e-mail encryption that attempts to respond to this demand.
Chor Benny   +13 more
core   +2 more sources

A Lightweight Hash-Based Blockchain Architecture for Industrial IoT

open access: yesApplied Sciences, 2019
Blockchain is a technology that can ensure data integrity in a distributed network, and it is actively applied in various fields. Recently, blockchain is gaining attention due to combining with the Internet of Things (IoT) technology in the industrial ...
Byoungjin Seok   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy