Results 71 to 80 of about 34,597 (127)
A research on the impact of encryption algorithms on the quality of VPN tunnels’ transmission
The following article presents the results on the impact of encryption algorithms and the cryptographic hash function on the QoS (Quality of Service) transmission in a computer network.
Strzęciwilk Dariusz+3 more
doaj +1 more source
Detecting brute-force attacks on cryptocurrency wallets
Blockchain is a distributed ledger, which is protected against malicious modifications by means of cryptographic tools, e.g. digital signatures and hash functions. One of the most prominent applications of blockchains is cryptocurrencies, such as Bitcoin.
AK Fedorov+10 more
core +1 more source
Blockchain-Based Piecewise Regressive Kupyna Cryptography for Secure Cloud Services
Cloud computing (CC) is a network-based concept where users access data at a specific time and place. The CC comprises servers, storage, databases, networking, software, analytics, and intelligence. Cloud security is the cybersecurity authority dedicated
Selvakumar Shanmugam+5 more
doaj +1 more source
How to Formalize Loop Iterations in Cryptographic Protocols Using ProVerif
The formal verification of cryptographic protocols has been extensively studied in recent years. To verify the cryptographic protocol security, formal verification tools consider protocol properties as interactive processes involving a cryptographic ...
Takehiko Mieno+3 more
doaj +1 more source
Implementation of a Data-Parallel Approach on a Lightweight Hash Function for IoT Devices
The Internet of Things is used in many application areas in our daily lives. Ensuring the security of valuable data transmitted over the Internet is a crucial challenge.
Abdullah Sevin
doaj +1 more source
Skyscraper: Fast Hashing on Big Primes
Arithmetic hash functions defined over prime fields have been actively developed and used in verifiable computation (VC) protocols. Among those, ellipticcurve- based SNARKs require large (256-bit and higher) primes. Such hash functions are notably slow,
Clémence Bouvier+6 more
doaj +1 more source
Finding Bugs in Cryptographic Hash Function Implementations. [PDF]
Mouha N, Raunak MS, Kuhn DR, Kacker R.
europepmc +1 more source
Comparative Study of Blockchain Hashing Algorithms with a Proposal for HashLEA
Blockchain has several unique features: data integrity, security, privacy, and immutability. For this reason, it is considered one of the most promising new technologies for a wide range of applications.
Abdullah Sevin+1 more
doaj +1 more source
Automated Quantum Circuit Generation for Computing Inverse Hash Functions
Several cryptographic systems depend upon the computational difficulty of reversing cryptographic hash functions. Robust hash functions transform inputs to outputs in such a way that the inputs cannot be later retrieved in a reasonable amount of time ...
Henderson, Elena R.+3 more
core
Improved 2-round collision attack on IoT hash standard ASCON-HASH
Lightweight cryptography algorithms are a class of ciphers designed to protect data generated and transmitted by the Internet of Things. They typically have low requirements in terms of storage space and power consumption, and are well-suited for ...
Di Zhai+4 more
doaj