Results 101 to 110 of about 36,351 (194)
A research on the impact of encryption algorithms on the quality of VPN tunnels’ transmission
The following article presents the results on the impact of encryption algorithms and the cryptographic hash function on the QoS (Quality of Service) transmission in a computer network.
Strzęciwilk Dariusz +3 more
doaj +1 more source
Towards an Information Theoretic Analysis of Searchable Encryption (Extended Version) [PDF]
Searchable encryption is a technique that allows a client to store data in encrypted form on a curious server, such that data can be retrieved while leaking a minimal amount of information to the server.
Doumen, J.M. +3 more
core +2 more sources
Can NSEC5 be practical for DNSSEC deployments? [PDF]
NSEC5 is proposed modification to DNSSEC that simultaneously guarantees two security properties: (1) privacy against offline zone enumeration, and (2) integrity of zone contents, even if an adversary compromises the authoritative nameserver responsible ...
Goldberg, Sharon +6 more
core
High Performance and Low Power Hardware Implementation for Cryptographic Hash Functions
Since hash functions are cryptography's most widely used primitives, efficient hardware implementation of hash functions is of critical importance. The proposed high performance hardware implementation of the hash functions used sponge construction which
Yunlong Zhang +3 more
doaj +1 more source
MiNTT: A Family of Module Lattice-Based Cryptographic Compression Functions
A cryptographic compression function is the part of a hash function most responsible for compressing input while avoiding collisions. In recent years, NIST has released a Call for Proposals for a variety of cryptographic primitives, albeit there have ...
Riley Vaughn, Mike Borowczak
doaj +1 more source
Quantum Amplitude Hash Function for Quantum Evidence Integrity
The integrity of evidence, a core principle of digital forensics, is essential for ensuring the reliability and admissibility of evidence in legal proceedings.
Donggun Lee, Hanbeom Shin, Seokhie Hong
doaj +1 more source
The Bitcoin digital currency appeared in 2009. Since this time, researchers and practitioners have looked under the hood of the open source Bitcoin currency, and discovered that Bitcoins Blockchain software architecture is useful for non-monetary ...
Prpić, J.
core
Year 2010 Issues on Cryptographic Algorithms [PDF]
In the financial sector, cryptographic algorithms are used as fundamental techniques for assuring confidentiality and integrity of data used in financial transactions and for authenticating entities involved in the transactions.
Masashi Une, Masayuki Kanda
core
Skyscraper: Fast Hashing on Big Primes
Arithmetic hash functions defined over prime fields have been actively developed and used in verifiable computation (VC) protocols. Among those, ellipticcurve- based SNARKs require large (256-bit and higher) primes. Such hash functions are notably slow,
Clémence Bouvier +6 more
doaj +1 more source
Sarmal: A cryptographic hash function
Recent years witnessed the continuous works on analysis of cryptographic hash functions which reveal that most of them are not as secure as claimed. Wang et al. presented the first full round collisions on MD4 and RIPEMD using a new attack technique on hash functions which is based on differential cryptanalysis.
openaire +1 more source

