Results 1 to 10 of about 2,495 (136)

Synthetic and real data sets for benchmarking non-cryptographic hash functions [PDF]

open access: yesData in Brief, 2019
The overall assessment of non-cryptographic functions is very complex and there is not a widely used benchmark. These data have been collected and created as a benchmark for testing non-cryptographic hash functions.
Yago Saez   +3 more
doaj   +2 more sources

A chaotic parallel hash engine with dynamic stochastic diffusion for blockchain and cloud security [PDF]

open access: yesScientific Reports
The design of cryptographic hash functions is crucial for ensuring the security of digital information. In this context, cellular automata (CAs) have emerged as a promising tool due to their inherent parallelism, determinism, and simplicity.
Qianyun Wang   +5 more
doaj   +2 more sources

The Untapped Potential of Ascon Hash Functions: Benchmarking, Hardware Profiling, and Application Insights for Secure IoT and Blockchain Systems [PDF]

open access: yesSensors
Hash functions are fundamental components in both cryptographic and non-cryptographic systems, supporting secure authentication, data integrity, fingerprinting, and indexing.
Meera Gladis Kurian, Yuhua Chen
doaj   +2 more sources

JAVASCRIPT SECURITY USING CRYPTOGRAPHIC HASH FUNCTIONS

open access: yesСучасні інформаційні системи, 2019
The subject of this research is the development of methods of protection against attacks on third-party JavaScript and the document object model (DOM).
Irada Rahimova   +3 more
doaj   +5 more sources

A hybrid hash framework for post quantum secure zero knowledge identification [PDF]

open access: yesScientific Reports
The advent of quantum computing poses substantial risks to conventional cryptographic mechanisms, particularly hash-based authentication and zero-knowledge identification (ZKI) protocols, which are susceptible to quantum algorithms such as Grover’s and ...
Samarth Bhadane   +3 more
doaj   +2 more sources

Antibodies and cryptographic hash functions: quantifying the specificity paradox [PDF]

open access: yesFrontiers in Immunology
The specificity of the immune response is critical to its biological function, yet the generality of immune recognition implies that antibody binding is multispecific or degenerate.
Robert J. Petrella, Robert J. Petrella
doaj   +2 more sources

Enhanced image hash using cellular automata with sponge construction and elliptic curve cryptography for secure image transaction [PDF]

open access: yesScientific Reports
With the rapid development of digital communications, sensitive digital storage security, especially that of images, remains a significant challenge.
M. Mohammed Ibrahim   +6 more
doaj   +2 more sources

Lightweight Cryptographic Hash Functions: Design Trends, Comparative Study, and Future Directions

open access: yesIEEE Access, 2022
The emergence of the Internet of Things (IoT) has enabled billions of devices that collect large amounts of data to be connected. Therefore, IoT security has fundamental requirements. One critical aspect of IoT security is data integrity.
Susila Windarta   +4 more
doaj   +1 more source

Cryptographic Hash Functions: [PDF]

open access: yesIEICE ESS Fundamentals Review, 2010
Cryptographic hash functions are an important tool of cryptography and play a fundamental role in efficient and secure information processing. A hash function processes an arbitrary finite length input message to a fixed length output referred to as the hash value.
Kan YASUDA, Yu SASAKI
openaire   +4 more sources

Home - About - Disclaimer - Privacy