Results 11 to 20 of about 2,959 (212)

Verification of Implementations of Cryptographic Hash Functions

open access: goldIEEE Access, 2017
Cryptographic hash functions have become the basis of modern network computing for identity authorization and secure computing; protocol consistency of cryptographic hash functions is one of the most important properties that affect the security and ...
Dexi Wang   +5 more
doaj   +2 more sources

Two New Lightweight Cryptographic Hash Functions Based on Saturnin and Beetle for the Internet of Things [PDF]

open access: goldIEEE Access, 2023
With the enormous growth in Internet of Things (IoT) applications, the volume of data shared among IoT devices is vastly increasing. Extensive IoT device connectivity and substantial data transmission have made information integrity susceptible to ...
Susila Windarta   +6 more
doaj   +2 more sources

Analysis of the cryptographic strength of the SHA-256 hash function using the SAT approach

open access: diamondНаучно-технический вестник информационных технологий, механики и оптики
Cryptographic hash functions play a significant role in modern information security systems by ensuring data integrity and enabling efficient data compression. One of the most important and widely used cryptographic hash functions is SHA-256 that belongs
V. V. Davydov   +3 more
doaj   +3 more sources

Efficient Negative Databases from Cryptographic Hash Functions [PDF]

open access: green, 2007
A negative database is a privacy-preserving storage system that allows to efficiently test if an entry is present, but makes it hard to enumerate all encoded entries. We improve significantly over previous work presented at ISC 2006 by Esponda et al.
Danezis, George   +5 more
openaire   +3 more sources

A secure and efficient cryptographic hash function based on NewFORK-256

open access: goldEgyptian Informatics Journal, 2012
Cryptographic hash functions serve as a fundamental building block of information security and are used in numerous security applications and protocols such as digital signature schemes, construction of MAC and random number generation, for ensuring data
Harshvardhan Tiwari, Krishna Asawa
doaj   +2 more sources

High Performance and Low Power Hardware Implementation for Cryptographic Hash Functions

open access: goldInternational Journal of Distributed Sensor Networks, 2014
Since hash functions are cryptography's most widely used primitives, efficient hardware implementation of hash functions is of critical importance. The proposed high performance hardware implementation of the hash functions used sponge construction which
Yunlong Zhang   +3 more
doaj   +2 more sources

Cryptographic Hash Functions: Theory and Practice [PDF]

open access: green, 2010
Cryptographic hash functions are an essential building block for security applications. Until 2005, the amount of theoretical research and cryptanalysis invested in this topic was rather limited. From the hundred designs published before 2005, about 80% was cryptanalyzed; this includes widely used hash functions such as MD4 and MD5.
Bart Preneel
openaire   +4 more sources

User privacy prevention model using supervised federated learning‐based block chain approach for internet of Medical Things

open access: yesCAAI Transactions on Intelligence Technology, EarlyView., 2023
Abstract This research focuses on addressing the privacy issues in healthcare advancement monitoring with the rapid establishment of the decentralised communication system in the Internet of Medical Things (IoMT). An integrated blockchain homomorphic encryption standard with an in‐build supervised learning‐based smart contract is designed to improvise ...
Chandramohan Dhasarathan   +7 more
wiley   +1 more source

Developing a New Collision-Resistant Hashing Algorithm

open access: yesMathematics, 2022
Today, cryptographic hash functions have numerous applications in different areas. At the same time, new collision attacks have been developed recently, making some widely used algorithms like SHA-1 vulnerable and unreliable.
Larissa V. Cherckesova   +3 more
doaj   +1 more source

Design and Analysis of Area and Energy Efficient Reconfigurable Cryptographic Accelerator for Securing IoT Devices

open access: yesSensors, 2022
Achieving low-cost and high-performance network security communication is necessary for Internet of Things (IoT) devices, including intelligent sensors and mobile robots.
Xvpeng Zhang   +10 more
doaj   +1 more source

Home - About - Disclaimer - Privacy