Results 51 to 60 of about 2,959 (212)

Finding Bugs in Cryptographic Hash Function Implementations

open access: yesIEEE Transactions on Reliability, 2018
Cryptographic hash functions are security-critical algorithms with many practical applications, notably in digital signatures. Developing an approach to test them can be particularly difficult, and bugs can remain unnoticed for many years. We revisit the NIST hash function competition, which was used to develop the SHA-3 standard, and apply a new ...
Nicky Mouha   +3 more
openaire   +2 more sources

Blockchain technology disruptions: Exploring accounting and auditing academics and practitioners' perception

open access: yesAccounting &Finance, EarlyView.
Abstract This study explores the practical impact of blockchain technology (BCT), which contrasts strongly with literature that has predominantly hypothesised BCT's potential to disrupt accounting practice. We interviewed 44 practitioners and academics with knowledge of BCT across 13 countries and industries.
Musbaudeen Titilope Oladejo   +3 more
wiley   +1 more source

Hashcash Tree, a Data Structure to Mitigate Denial-of-Service Attacks

open access: yesAlgorithms, 2023
Client puzzle protocols are widely adopted mechanisms for defending against resource exhaustion denial-of-service (DoS) attacks. Among the simplest puzzles used by such protocols, there are cryptographic challenges requiring the finding of hash values ...
Mario Alviano
doaj   +1 more source

SMASH – A Cryptographic Hash Function [PDF]

open access: yes, 2005
This paper presents a new hash function design, which is different from the popular designs of the MD4-family. Seen in the light of recent attacks on MD4, MD5, SHA-0, SHA-1, and on RIPEMD, there is a need to consider other hash function design strategies. The paper presents also a concrete hash function design named SMASH.
openaire   +1 more source

Miners' Reward Elasticity and Stability of Competing Proof‐of‐Work Cryptocurrencies

open access: yesInternational Economic Review, EarlyView.
ABSTRACT Proof‐of‐Work cryptocurrencies employ miners to sustain the system through algorithmic reward adjustments. We develop a stochastic model of the multicurrency mining and identify conditions for stable transaction speeds. Bitcoin's algorithm requires hash supply elasticity <$<$1 for stability, while ASERT remains stable for any elasticity and ...
Kohei Kawaguchi   +2 more
wiley   +1 more source

A Survey for Deep Reinforcement Learning Based Network Intrusion Detection

open access: yesApplied AI Letters, Volume 7, Issue 2, June 2026.
This paper surveys deep reinforcement learning (DRL) for network intrusion detection, evaluating model efficiency, minority attack detection, and dataset imbalance. Findings show DRL achieves state‐of‐the‐art results on public datasets, sometimes surpassing traditional deep learning.
Wanrong Yang   +3 more
wiley   +1 more source

Blockchain for the Arts and Humanities

open access: yesFuture Humanities, Volume 4, Issue 1, May 2026.
ABSTRACT As born‐digital cultural materials proliferate, the arts and humanities require infrastructures that guarantee provenance, authenticity, and equitable access. This paper delivers a comprehensive, critical survey of blockchain's potential and limits across the sector.
James O'Sullivan
wiley   +1 more source

Analysis of cryptographic hash functions [PDF]

open access: yes, 2019
This thesis concentrates on analysis of cryptographic hash functions, one of the most important primitives used in the modern cryptography. We start with an introduction of the cryptographic hash functions, and a survey on the development of the cryptanalysis tools. To enrich the cryptanalysts' toolbox, we developed several interesting techniques under
openaire   +3 more sources

Application of Embodied Intelligence in Intelligent Warehousing and Logistics Scenarios

open access: yesEngineering Reports, Volume 8, Issue 3, March 2026.
Embodied intelligence (EI) enhances digital platform efficiency in intelligent logistics, reducing transportation costs, improving throughput by 37.5%, and lowering energy consumption. EI‐driven improvements lead to discriminatory pricing strategies, while lightweight encryption ensures minimal performance overhead, maintaining real‐time operations ...
Jun Zhang, Chuan Zhang, Mingtao Zhang
wiley   +1 more source

Survey of Lightweight Hardware-Based Hash Functions for Security in Constrained IoT Devices

open access: yesIEEE Access
Lightweight cryptographic primitives are commonly used to secure communication in resource-constrained IoT devices such as RFID tags, sensors, actuators, wireless sensor networks, and edge gateways.
Mohsin Khan   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy