Results 91 to 100 of about 36,351 (194)

Extended Capabilities for a Privacy-Enhanced Participatory Sensing Infrastructure (PEPSI)

open access: yes, 2013
Participatory sensing is emerging as an innovative computing paradigm that targets the ubiquity of always-connected mobile phones and their sensing capabilities.
De Cristofaro, Emiliano   +1 more
core   +1 more source

Spatiotemporal chaotic one-way Hash function construction based on coupled tent maps

open access: yesTongxin xuebao, 2007
A novel coupled tent maps-based spatiotemporal chaotic cryptographic Hash function was proposed.Compared with the discrete tent map,the coupled discrete tent spatiotemporal chaotic maps have longer computer-realization-period,nearly uniform distribution ...
LIU Jian-dong, FU Xiu-li
doaj   +2 more sources

Analysis of the cryptographic strength of the SHA-256 hash function using the SAT approach

open access: yesНаучно-технический вестник информационных технологий, механики и оптики
Cryptographic hash functions play a significant role in modern information security systems by ensuring data integrity and enabling efficient data compression. One of the most important and widely used cryptographic hash functions is SHA-256 that belongs
V. V. Davydov   +3 more
doaj   +1 more source

Hash-Tree Anti-Tampering Schemes [PDF]

open access: yes, 2002
Procedures that provide detection, location and correction of tampering in documents are known as anti-tampering schemes. In this paper we describe how to construct an anti-tampering scheme using a pre-computed tree of hashes.
Ashman, Helen, Moss, Ben
core  

Efficient Negative Databases from Cryptographic Hash Functions [PDF]

open access: yes, 2007
A negative database is a privacy-preserving storage system that allows to efficiently test if an entry is present, but makes it hard to enumerate all encoded entries. We improve significantly over previous work presented at ISC 2006 by Esponda et al.
Danezis, George   +5 more
openaire   +2 more sources

A tight security reduction in the quantum random oracle model for code-based signature schemes [PDF]

open access: yes, 2017
Quantum secure signature schemes have a lot of attention recently, in particular because of the NIST call to standardize quantum safe cryptography. However, only few signature schemes can have concrete quantum security because of technical difficulties ...
Chailloux, André   +1 more
core   +1 more source

Cryptographic Hash Function using Cellular Automata

open access: yesInternational Journal of Computer Applications Technology and Research, 2016
Since two distinct messages are extremely unlikely to generate identical message digests, one can use this property of cryptographic hash functions to detect when a message has been altered. If one takes a binary file and computes a digest of the file, one can record this baseline digest. In the future, the digest can be recomputed on the file.
openaire   +1 more source

Haraka v2 – Efficient Short-Input Hashing for Post-Quantum Applications

open access: yesIACR Transactions on Symmetric Cryptology, 2017
Recently, many efficient cryptographic hash function design strategies have been explored, not least because of the SHA-3 competition. These designs are, almost exclusively, geared towards high performance on long inputs.
Stefan Kölbl   +3 more
doaj   +1 more source

SHAREDWEALTH: A CRYPTOCURRENCY TO REWARD MINERS EVENLY [PDF]

open access: yes, 2015
Bitcoin [19] is a decentralized cryptocurrency that has recently gained popularity and has emerged as a popular medium of exchange. The total market capitalization is around 1.5 billion US dollars as of October 2013 [28].
Syed, Siddiq Ahmed
core   +1 more source

Cryptographic Hash Functions: Theory and Practice [PDF]

open access: yes, 2010
Cryptographic hash functions are an essential building block for security applications. Until 2005, the amount of theoretical research and cryptanalysis invested in this topic was rather limited. From the hundred designs published before 2005, about 80% was cryptanalyzed; this includes widely used hash functions such as MD4 and MD5.
openaire   +3 more sources

Home - About - Disclaimer - Privacy