Results 1 to 10 of about 36,351 (194)

Synthetic and real data sets for benchmarking non-cryptographic hash functions [PDF]

open access: yesData in Brief, 2019
The overall assessment of non-cryptographic functions is very complex and there is not a widely used benchmark. These data have been collected and created as a benchmark for testing non-cryptographic hash functions.
Yago Saez   +3 more
doaj   +2 more sources

Cryptographic Hash Functions [PDF]

open access: yes, 2009
Kryptografiske hashfunktioner anvendes i mange forskellige områder inden for kryptografi: i digitale signatursystemer og i såkaldt public‐key kryptografi, til passwordbeskyttelse og autentificering af beskeder, til dannelse af kryptografiske nøgler og tilfældige tal, osv.
Thomsen, Søren Steffen
core   +3 more sources

A chaotic parallel hash engine with dynamic stochastic diffusion for blockchain and cloud security [PDF]

open access: yesScientific Reports
The design of cryptographic hash functions is crucial for ensuring the security of digital information. In this context, cellular automata (CAs) have emerged as a promising tool due to their inherent parallelism, determinism, and simplicity.
Qianyun Wang   +5 more
doaj   +2 more sources

JAVASCRIPT SECURITY USING CRYPTOGRAPHIC HASH FUNCTIONS

open access: yesСучасні інформаційні системи, 2019
The subject of this research is the development of methods of protection against attacks on third-party JavaScript and the document object model (DOM).
Irada Rahimova   +3 more
doaj   +5 more sources

The Untapped Potential of Ascon Hash Functions: Benchmarking, Hardware Profiling, and Application Insights for Secure IoT and Blockchain Systems [PDF]

open access: yesSensors
Hash functions are fundamental components in both cryptographic and non-cryptographic systems, supporting secure authentication, data integrity, fingerprinting, and indexing.
Meera Gladis Kurian, Yuhua Chen
doaj   +2 more sources

A hybrid hash framework for post quantum secure zero knowledge identification [PDF]

open access: yesScientific Reports
The advent of quantum computing poses substantial risks to conventional cryptographic mechanisms, particularly hash-based authentication and zero-knowledge identification (ZKI) protocols, which are susceptible to quantum algorithms such as Grover’s and ...
Samarth Bhadane   +3 more
doaj   +2 more sources

Antibodies and cryptographic hash functions: quantifying the specificity paradox [PDF]

open access: yesFrontiers in Immunology
The specificity of the immune response is critical to its biological function, yet the generality of immune recognition implies that antibody binding is multispecific or degenerate.
Robert J. Petrella, Robert J. Petrella
doaj   +2 more sources

Computational and Energy Costs of Cryptographic Algorithms on Handheld Devices [PDF]

open access: yesFuture Internet, 2011
Networks are evolving toward a ubiquitous model in which heterogeneous devices are interconnected. Cryptographic algorithms are required for developing security solutions that protect network activity. However, the computational and energy limitations of
Helena Rifà-Pous   +1 more
doaj   +6 more sources

Enhanced image hash using cellular automata with sponge construction and elliptic curve cryptography for secure image transaction [PDF]

open access: yesScientific Reports
With the rapid development of digital communications, sensitive digital storage security, especially that of images, remains a significant challenge.
M. Mohammed Ibrahim   +6 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy