Results 11 to 20 of about 2,959 (212)
Verification of Implementations of Cryptographic Hash Functions
Cryptographic hash functions have become the basis of modern network computing for identity authorization and secure computing; protocol consistency of cryptographic hash functions is one of the most important properties that affect the security and ...
Dexi Wang +5 more
doaj +2 more sources
Two New Lightweight Cryptographic Hash Functions Based on Saturnin and Beetle for the Internet of Things [PDF]
With the enormous growth in Internet of Things (IoT) applications, the volume of data shared among IoT devices is vastly increasing. Extensive IoT device connectivity and substantial data transmission have made information integrity susceptible to ...
Susila Windarta +6 more
doaj +2 more sources
Analysis of the cryptographic strength of the SHA-256 hash function using the SAT approach
Cryptographic hash functions play a significant role in modern information security systems by ensuring data integrity and enabling efficient data compression. One of the most important and widely used cryptographic hash functions is SHA-256 that belongs
V. V. Davydov +3 more
doaj +3 more sources
Efficient Negative Databases from Cryptographic Hash Functions [PDF]
A negative database is a privacy-preserving storage system that allows to efficiently test if an entry is present, but makes it hard to enumerate all encoded entries. We improve significantly over previous work presented at ISC 2006 by Esponda et al.
Danezis, George +5 more
openaire +3 more sources
A secure and efficient cryptographic hash function based on NewFORK-256
Cryptographic hash functions serve as a fundamental building block of information security and are used in numerous security applications and protocols such as digital signature schemes, construction of MAC and random number generation, for ensuring data
Harshvardhan Tiwari, Krishna Asawa
doaj +2 more sources
High Performance and Low Power Hardware Implementation for Cryptographic Hash Functions
Since hash functions are cryptography's most widely used primitives, efficient hardware implementation of hash functions is of critical importance. The proposed high performance hardware implementation of the hash functions used sponge construction which
Yunlong Zhang +3 more
doaj +2 more sources
Cryptographic Hash Functions: Theory and Practice [PDF]
Cryptographic hash functions are an essential building block for security applications. Until 2005, the amount of theoretical research and cryptanalysis invested in this topic was rather limited. From the hundred designs published before 2005, about 80% was cryptanalyzed; this includes widely used hash functions such as MD4 and MD5.
Bart Preneel
openaire +4 more sources
Abstract This research focuses on addressing the privacy issues in healthcare advancement monitoring with the rapid establishment of the decentralised communication system in the Internet of Medical Things (IoMT). An integrated blockchain homomorphic encryption standard with an in‐build supervised learning‐based smart contract is designed to improvise ...
Chandramohan Dhasarathan +7 more
wiley +1 more source
Developing a New Collision-Resistant Hashing Algorithm
Today, cryptographic hash functions have numerous applications in different areas. At the same time, new collision attacks have been developed recently, making some widely used algorithms like SHA-1 vulnerable and unreliable.
Larissa V. Cherckesova +3 more
doaj +1 more source
Achieving low-cost and high-performance network security communication is necessary for Internet of Things (IoT) devices, including intelligent sensors and mobile robots.
Xvpeng Zhang +10 more
doaj +1 more source

