Results 101 to 110 of about 2,959 (212)
Analysis of cryptographic hash functions
The National Institute of Standards and Technology (NIST) launched in 2008 a public competition, called the SHA-3 competition, aiming at definining a new standard for hash functions. We study here the algebraic properties of some of the candidates to this contest. Among the functions analyzed, is the Keccak algorithm, which was recently announced to be
openaire +1 more source
A second pre-image attack and a collision attack to cryptographic hash function lux
SULAK Fatih KOÇAK
openalex +1 more source
Securing internet of things devices using a hybrid approach. [PDF]
Jenny RS +9 more
europepmc +1 more source
Experiment: Hash Functions with Parameters in the Cryptographic Message Syntax (CMS) and S/MIME [PDF]
Jim Schaad
openalex +1 more source
QRBT: Quantum Driven Reinforcement Learning for Scalable Blockchain Transaction Processing. [PDF]
Lella KK, Mallu SRK.
europepmc +1 more source
Universal one-way hash functions and their cryptographic applications [PDF]
Moni Naor, Moti Yung
openalex +1 more source
BBAS: A blockchain-based authentication system for e-health with multi-factor authentication, access control, and post-quantum security. [PDF]
Latif R +4 more
europepmc +1 more source

