Results 71 to 80 of about 34,597 (127)

A research on the impact of encryption algorithms on the quality of VPN tunnels’ transmission

open access: yesITM Web of Conferences, 2018
The following article presents the results on the impact of encryption algorithms and the cryptographic hash function on the QoS (Quality of Service) transmission in a computer network.
Strzęciwilk Dariusz   +3 more
doaj   +1 more source

Detecting brute-force attacks on cryptocurrency wallets

open access: yes, 2019
Blockchain is a distributed ledger, which is protected against malicious modifications by means of cryptographic tools, e.g. digital signatures and hash functions. One of the most prominent applications of blockchains is cryptocurrencies, such as Bitcoin.
AK Fedorov   +10 more
core   +1 more source

Blockchain-Based Piecewise Regressive Kupyna Cryptography for Secure Cloud Services

open access: yesIET Information Security
Cloud computing (CC) is a network-based concept where users access data at a specific time and place. The CC comprises servers, storage, databases, networking, software, analytics, and intelligence. Cloud security is the cybersecurity authority dedicated
Selvakumar Shanmugam   +5 more
doaj   +1 more source

How to Formalize Loop Iterations in Cryptographic Protocols Using ProVerif

open access: yesIEEE Access
The formal verification of cryptographic protocols has been extensively studied in recent years. To verify the cryptographic protocol security, formal verification tools consider protocol properties as interactive processes involving a cryptographic ...
Takehiko Mieno   +3 more
doaj   +1 more source

Implementation of a Data-Parallel Approach on a Lightweight Hash Function for IoT Devices

open access: yesMathematics
The Internet of Things is used in many application areas in our daily lives. Ensuring the security of valuable data transmitted over the Internet is a crucial challenge.
Abdullah Sevin
doaj   +1 more source

Skyscraper: Fast Hashing on Big Primes

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
Arithmetic hash functions defined over prime fields have been actively developed and used in verifiable computation (VC) protocols. Among those, ellipticcurve- based SNARKs require large (256-bit and higher) primes. Such hash functions are notably slow,
Clémence Bouvier   +6 more
doaj   +1 more source

Finding Bugs in Cryptographic Hash Function Implementations. [PDF]

open access: yesIEEE Trans Reliab, 2018
Mouha N, Raunak MS, Kuhn DR, Kacker R.
europepmc   +1 more source

Comparative Study of Blockchain Hashing Algorithms with a Proposal for HashLEA

open access: yesApplied Sciences
Blockchain has several unique features: data integrity, security, privacy, and immutability. For this reason, it is considered one of the most promising new technologies for a wide range of applications.
Abdullah Sevin   +1 more
doaj   +1 more source

Automated Quantum Circuit Generation for Computing Inverse Hash Functions

open access: yes
Several cryptographic systems depend upon the computational difficulty of reversing cryptographic hash functions. Robust hash functions transform inputs to outputs in such a way that the inputs cannot be later retrieved in a reasonable amount of time ...
Henderson, Elena R.   +3 more
core  

Improved 2-round collision attack on IoT hash standard ASCON-HASH

open access: yesHeliyon
Lightweight cryptography algorithms are a class of ciphers designed to protect data generated and transmitted by the Internet of Things. They typically have low requirements in terms of storage space and power consumption, and are well-suited for ...
Di Zhai   +4 more
doaj  

Home - About - Disclaimer - Privacy