Practical (Second) Preimage Attacks on the TCS_SHA-3 Family of Cryptographic Hash Functions [PDF]
Gautham Sekar, S. Bhattacharya
openalex +1 more source
Optimized algorithms and architectures for fast non-cryptographic hash functions in hardware
Arish Sateesan +4 more
openalex +2 more sources
Blockchain-Based Piecewise Regressive Kupyna Cryptography for Secure Cloud Services
Cloud computing (CC) is a network-based concept where users access data at a specific time and place. The CC comprises servers, storage, databases, networking, software, analytics, and intelligence. Cloud security is the cybersecurity authority dedicated
Selvakumar Shanmugam +5 more
doaj +1 more source
How to Formalize Loop Iterations in Cryptographic Protocols Using ProVerif
The formal verification of cryptographic protocols has been extensively studied in recent years. To verify the cryptographic protocol security, formal verification tools consider protocol properties as interactive processes involving a cryptographic ...
Takehiko Mieno +3 more
doaj +1 more source
Multi-factor signcryption scheme for secure authentication using hyper elliptic curve cryptography and bio-hash function [PDF]
Vani Rajasekar, J. Premalatha, K. Sathya
openalex +1 more source
Lightweight Hash Function Design for the Internet of Things: Structure and SAT-Based Cryptanalysis
This paper introduces a lightweight cryptographic hash algorithm, LWH-128, developed using a sponge-based construction and specifically adapted for operation under constrained computational and energy conditions typical of embedded systems and Internet ...
Kairat Sakan +3 more
doaj +1 more source
Development of the Hash Function Using Modified Skew Tent Map to Improve Blockchain Technology
Using SHA256 in the Blockchain system for security purposes, as it is important in linking blocks and preventing tampering efficiently and securely. In order to further confirm the security of SHA256 and protect it and increase its susceptibility to ...
Raghad Kadhim Salih +3 more
doaj +1 more source
Using fuzzy bits and neural networks to partially invert few rounds of some cryptographic hash functions [PDF]
S.V. Goncharov
openalex +1 more source
Finding Bugs in Cryptographic Hash Function Implementations. [PDF]
Mouha N, Raunak MS, Kuhn DR, Kacker R.
europepmc +1 more source

