Results 51 to 60 of about 34,597 (127)
Comparative Study of Keccak SHA-3 Implementations
This paper conducts an extensive comparative study of state-of-the-art solutions for implementing the SHA-3 hash function. SHA-3, a pivotal component in modern cryptography, has spawned numerous implementations across diverse platforms and technologies ...
Alessandra Dolmeta+2 more
doaj +1 more source
GOTCHA Password Hackers! [PDF]
We introduce GOTCHAs (Generating panOptic Turing Tests to Tell Computers and Humans Apart) as a way of preventing automated offline dictionary attacks against user selected passwords.
Baddeley A.+6 more
core +1 more source
Practical Preimages for Maraca [PDF]
We show a practical preimage attack on the cryptographic hash function Maraca, which was submitted as a candidate to the NIST SHA-3 competition.
Indesteege, Sebastiaan, Preneel, Bart
core +1 more source
Comparison of hash function algorithms against attacks: a review [PDF]
Hash functions are considered key components of nearly all cryptographic protocols, as well as of many security applications such as message authentication codes, data integrity, password storage, and random number generation.
Abas, Hafiza+5 more
core +1 more source
Fully Integrated Passive UHF RFID Tag for Hash-Based Mutual Authentication Protocol
Passive radio-frequency identification (RFID) tag has been used in many applications. While the RFID market is expected to grow, concerns about security and privacy of the RFID tag should be overcome for the future use.
Shugo Mikami+3 more
doaj +1 more source
An Efficient Signature Scheme From Supersingular Elliptic Curve Isogenies
Since supersingular elliptic curve isogenies are one of the several candidate sources of hardness for building post-quantum cryptographic primitives, the research of efficient signature schemes based on them is still a hot topic.
Yan Huang+3 more
doaj +1 more source
Deck-Based Wide Block Cipher Modes and an Exposition of the Blinded Keyed Hashing Model
We present two tweakable wide block cipher modes from doubly-extendable cryptographic keyed (deck) functions and a keyed hash function: double-decker and docked-double-decker.
Aldo Gunsing, Joan Daemen, Bart Mennink
doaj +1 more source
ANALYSIS OF IMPLEMENTATIONS OF THE CRYPTOGRAPHIC HASH FUNCTION SHA-1 BASED ON PIPELINE CIRCUITS
An analysis of hardware implementations of the cryptographic hash function SHA-1 based on pipeline circuits with different numbers of logic levels was made in this paper.
E. V. Listopad
doaj
GOST 34.11-2018 Analysis in The Context of Zero-Knowledge Proofs
Zero-knowledge proofs are being increasingly applied to a wide range of tasks in modern distributed information systems. Of particular interest are such areas of activity as digital asset management systems, anonymous electronic voting systems, and ...
Vladlen D. Afonin+2 more
doaj +1 more source
Provably secure keyless hash function uses Random Oracle (RO) or Sponge principles for the design and construction of security-centric hash algorithms. It capitalizes the aforesaid principles to produce outcomes like MD2, MD5, SHA-160, SHA-224/256, SHA ...
P. Karthik, P. Shanthi Bala
doaj