Results 81 to 90 of about 45,527 (206)

Improved 2-round collision attack on IoT hash standard ASCON-HASH

open access: yesHeliyon
Lightweight cryptography algorithms are a class of ciphers designed to protect data generated and transmitted by the Internet of Things. They typically have low requirements in terms of storage space and power consumption, and are well-suited for ...
Di Zhai   +4 more
doaj   +1 more source

Reducing Power of BLAKE3 implementations with dedicated FPGA resources [PDF]

open access: yesInternational Journal of Electronics and Telecommunications
The BLAKE cryptographic hash functions are efficiently expressed in software; however, their hardware implementations do not match the speed and power efficiency of alternative methods.
Jarosław Sugier
doaj   +1 more source

Chameleon hash function based on SM3 and its applications

open access: yes网络与信息安全学报
The immutability of blockchain technology was known to ensure that once data was added to the chain, it could not be altered, which meant that any harmful information uploaded would continue to exert serious negative impacts. To ensure that on-chain data
ZHAO Xianxin   +3 more
doaj  

Blockchain-Based Piecewise Regressive Kupyna Cryptography for Secure Cloud Services

open access: yesIET Information Security
Cloud computing (CC) is a network-based concept where users access data at a specific time and place. The CC comprises servers, storage, databases, networking, software, analytics, and intelligence. Cloud security is the cybersecurity authority dedicated
Selvakumar Shanmugam   +5 more
doaj   +1 more source

Lightweight Hash Function Design for the Internet of Things: Structure and SAT-Based Cryptanalysis

open access: yesAlgorithms
This paper introduces a lightweight cryptographic hash algorithm, LWH-128, developed using a sponge-based construction and specifically adapted for operation under constrained computational and energy conditions typical of embedded systems and Internet ...
Kairat Sakan   +3 more
doaj   +1 more source

Sarmal: A cryptographic hash function

open access: yes, 2020
Recent years witnessed the continuous works on analysis of cryptographic hash functions which reveal that most of them are not as secure as claimed. Wang et al. presented the first full round collisions on MD4 and RIPEMD using a new attack technique on hash functions which is based on differential cryptanalysis.
openaire   +1 more source

On graph-based cryptographic hash functions

open access: yes, 2009
Hash functions are an invaluable tool for cryptography. They must primarily satisfy collision resistance, but standardized hash functions like SHA also satisfy stronger properties needed for the wide range of their applications. The design of many hash functions including SHA is based on a compression function that is close to a block cipher and on a ...
openaire   +2 more sources

How to Formalize Loop Iterations in Cryptographic Protocols Using ProVerif

open access: yesIEEE Access
The formal verification of cryptographic protocols has been extensively studied in recent years. To verify the cryptographic protocol security, formal verification tools consider protocol properties as interactive processes involving a cryptographic ...
Takehiko Mieno   +3 more
doaj   +1 more source

Black-Box Property of Cryptographic Hash Functions [PDF]

open access: yes, 2012
We define a new black-box property of cryptographic hash function families H :{0,1}K ×{0,1}*→{0,1}y which guarantees that for a randomly chosen hash function H K from the family, everything "non-trivial" we are able to compute having access to the key K , we can compute only with oracle access to H K . If a hash function family is pseudo-random and has
openaire   +1 more source

Development of the Hash Function Using Modified Skew Tent Map to Improve Blockchain Technology

open access: yesIbn Al-Haitham Journal for Pure and Applied Sciences
Using SHA256 in the Blockchain system for security purposes, as it is important in linking blocks and preventing tampering efficiently and securely. In order to further confirm the security of SHA256 and protect it and increase its susceptibility to ...
Raghad Kadhim Salih   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy