Post-Quantum Revocable Linkable Ring Signature Scheme Based on SPHINCS+ for V2G Scenarios. [PDF]
Liu S, Du YN, Wang XA, Hu X, Su HE.
europepmc +1 more source
Two-Dimensional Control and Assurance of Data Integrity in Information Systems Based on Residue Number System Codes and Cryptographic Hash Functions [PDF]
Sergey Dichenko, Oleg Finko
openalex +1 more source
A secure multi phase authentication protocol for cloud infrastructure using elliptic curve cryptography. [PDF]
Sivasankar R, Marikkannan M.
europepmc +1 more source
A Survey on Proof of Sequential Work: Development, Security Analysis, and Application Prospects. [PDF]
Zhang J +7 more
europepmc +1 more source
Comparative Analysis of Different Cryptographic Hash Functions
Cryptographic hash functions are crucial tools used to protect information in digital devices. These functions take an input of various size consisting of characters and convert it to a digest of fixed size, known as a hash value. The functions produce the same hash value when using the same input, and are not invertible.
Kaufmann, Alex, Gartmon, Emelie
openaire +1 more source
A scalable post quantum secure blockchain framework with adaptive time consensus in cloud environments. [PDF]
Velmurugan M, Kumar MR.
europepmc +1 more source
Secure, scalable, and interoperable healthcare data exchange using layer-2 ZK-rollups, smart contracts, and IPFS. [PDF]
Raghav A +5 more
europepmc +1 more source
Blockchain-enabled identity management for IoT: a multi-layered defense against adversarial AI. [PDF]
Usama M +5 more
europepmc +1 more source
Questioning the Criteria for Evaluating Non-Cryptographic Hash Functions
Catherine Hayes, David Malone
openalex +1 more source
Blockchain and federated Q-learning-based secure, fault tolerant, and energy efficient framework for ad hoc networks. [PDF]
Tandon R, Gupta PK, Cheng X.
europepmc +1 more source

