Results 71 to 80 of about 45,527 (206)

ANALYSIS OF IMPLEMENTATIONS OF THE CRYPTOGRAPHIC HASH FUNCTION SHA-1 BASED ON PIPELINE CIRCUITS

open access: yesДоклады Белорусского государственного университета информатики и радиоэлектроники, 2019
An analysis of hardware implementations of the cryptographic hash function SHA-1 based on pipeline circuits with different numbers of logic levels was made in this paper.
E. V. Listopad
doaj  

Fully Integrated Passive UHF RFID Tag for Hash-Based Mutual Authentication Protocol

open access: yesThe Scientific World Journal, 2015
Passive radio-frequency identification (RFID) tag has been used in many applications. While the RFID market is expected to grow, concerns about security and privacy of the RFID tag should be overcome for the future use.
Shugo Mikami   +3 more
doaj   +1 more source

An Efficient Signature Scheme From Supersingular Elliptic Curve Isogenies

open access: yesIEEE Access, 2019
Since supersingular elliptic curve isogenies are one of the several candidate sources of hardness for building post-quantum cryptographic primitives, the research of efficient signature schemes based on them is still a hot topic.
Yan Huang   +3 more
doaj   +1 more source

GOST 34.11-2018 Analysis in The Context of Zero-Knowledge Proofs

open access: yesБезопасность информационных технологий
Zero-knowledge proofs are being increasingly applied to a wide range of tasks in modern distributed information systems. Of particular interest are such areas of activity as digital asset management systems, anonymous electronic voting systems, and ...
Vladlen D. Afonin   +2 more
doaj   +1 more source

Efficient Negative Databases from Cryptographic Hash Functions [PDF]

open access: yes, 2007
A negative database is a privacy-preserving storage system that allows to efficiently test if an entry is present, but makes it hard to enumerate all encoded entries. We improve significantly over previous work presented at ISC 2006 by Esponda et al.
Danezis, George   +5 more
openaire   +2 more sources

Design keyed Hash function based on couple chaotic system

open access: yesTongxin xuebao, 2006
Analyzed the chaotic and cryptographic properties of a piecewise nonlinear map, a couple chaotic digital sys-tem was proposed based on perturbing which used the piecewise nonlinear, then a new approach to construct keyed Hash function was presented.
WEI Peng-cheng1   +3 more
doaj   +2 more sources

Cryptographic Hash Function using Cellular Automata

open access: yesInternational Journal of Computer Applications Technology and Research, 2016
Since two distinct messages are extremely unlikely to generate identical message digests, one can use this property of cryptographic hash functions to detect when a message has been altered. If one takes a binary file and computes a digest of the file, one can record this baseline digest. In the future, the digest can be recomputed on the file.
openaire   +1 more source

Cryptographic Hash Functions: Theory and Practice [PDF]

open access: yes, 2010
Cryptographic hash functions are an essential building block for security applications. Until 2005, the amount of theoretical research and cryptanalysis invested in this topic was rather limited. From the hundred designs published before 2005, about 80% was cryptanalyzed; this includes widely used hash functions such as MD4 and MD5.
openaire   +3 more sources

MiNTT: A Family of Module Lattice-Based Cryptographic Compression Functions

open access: yesIEEE Access
A cryptographic compression function is the part of a hash function most responsible for compressing input while avoiding collisions. In recent years, NIST has released a Call for Proposals for a variety of cryptographic primitives, albeit there have ...
Riley Vaughn, Mike Borowczak
doaj   +1 more source

Home - About - Disclaimer - Privacy