Results 101 to 110 of about 36,351 (194)

A research on the impact of encryption algorithms on the quality of VPN tunnels’ transmission

open access: yesITM Web of Conferences, 2018
The following article presents the results on the impact of encryption algorithms and the cryptographic hash function on the QoS (Quality of Service) transmission in a computer network.
Strzęciwilk Dariusz   +3 more
doaj   +1 more source

Towards an Information Theoretic Analysis of Searchable Encryption (Extended Version) [PDF]

open access: yes, 2008
Searchable encryption is a technique that allows a client to store data in encrypted form on a curious server, such that data can be retrieved while leaking a minimal amount of information to the server.
Doumen, J.M.   +3 more
core   +2 more sources

Can NSEC5 be practical for DNSSEC deployments? [PDF]

open access: yes, 2017
NSEC5 is proposed modification to DNSSEC that simultaneously guarantees two security properties: (1) privacy against offline zone enumeration, and (2) integrity of zone contents, even if an adversary compromises the authoritative nameserver responsible ...
Goldberg, Sharon   +6 more
core  

High Performance and Low Power Hardware Implementation for Cryptographic Hash Functions

open access: yesInternational Journal of Distributed Sensor Networks, 2014
Since hash functions are cryptography's most widely used primitives, efficient hardware implementation of hash functions is of critical importance. The proposed high performance hardware implementation of the hash functions used sponge construction which
Yunlong Zhang   +3 more
doaj   +1 more source

MiNTT: A Family of Module Lattice-Based Cryptographic Compression Functions

open access: yesIEEE Access
A cryptographic compression function is the part of a hash function most responsible for compressing input while avoiding collisions. In recent years, NIST has released a Call for Proposals for a variety of cryptographic primitives, albeit there have ...
Riley Vaughn, Mike Borowczak
doaj   +1 more source

Quantum Amplitude Hash Function for Quantum Evidence Integrity

open access: yesIEEE Access
The integrity of evidence, a core principle of digital forensics, is essential for ensuring the reliability and admissibility of evidence in legal proceedings.
Donggun Lee, Hanbeom Shin, Seokhie Hong
doaj   +1 more source

Unpacking Blockchains

open access: yes, 2017
The Bitcoin digital currency appeared in 2009. Since this time, researchers and practitioners have looked under the hood of the open source Bitcoin currency, and discovered that Bitcoins Blockchain software architecture is useful for non-monetary ...
Prpić, J.
core  

Year 2010 Issues on Cryptographic Algorithms [PDF]

open access: yes
In the financial sector, cryptographic algorithms are used as fundamental techniques for assuring confidentiality and integrity of data used in financial transactions and for authenticating entities involved in the transactions.
Masashi Une, Masayuki Kanda
core  

Skyscraper: Fast Hashing on Big Primes

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
Arithmetic hash functions defined over prime fields have been actively developed and used in verifiable computation (VC) protocols. Among those, ellipticcurve- based SNARKs require large (256-bit and higher) primes. Such hash functions are notably slow,
Clémence Bouvier   +6 more
doaj   +1 more source

Sarmal: A cryptographic hash function

open access: yes, 2020
Recent years witnessed the continuous works on analysis of cryptographic hash functions which reveal that most of them are not as secure as claimed. Wang et al. presented the first full round collisions on MD4 and RIPEMD using a new attack technique on hash functions which is based on differential cryptanalysis.
openaire   +1 more source

Home - About - Disclaimer - Privacy