Results 1 to 10 of about 1,430 (134)

An Efficient Retrieval System Framework for Fabrics Based on Fine-Grained Similarity [PDF]

open access: yesEntropy, 2022
In the context of “double carbon”, as a traditional high energy consumption industry, the textile industry is facing the severe challenges of energy saving and emission reduction.
Jun Xiang, Ruru Pan, Weidong Gao
doaj   +2 more sources

Quantum Free-Start Collision Attacks on Double Block Length Hashing with Round-Reduced AES-256

open access: diamondIACR Transactions on Symmetric Cryptology, 2021
Recently, Hosoyamada and Sasaki (EUROCRYPT 2020), and Xiaoyang Dong et al. (ASIACRYPT 2020) proposed quantum collision attacks against AES-like hashing modes AES-MMO and AES-MP.
Amit Kumar Chauhan   +2 more
doaj   +3 more sources

Improved Quantum Rebound Attacks on Double Block Length Hashing with Round-Reduced AES-256 and ARIA-256

open access: diamondIACR Transactions on Symmetric Cryptology
At EUROCRYPT 2020, Hosoyamada and Sasaki proposed the first dedicated quantum collision attacks on hash functions. Their proposal presented a quantum adaptation of the rebound attack and revealed that differential trails, which have too low probability ...
Dongjae Lee, Seokhie Hong
doaj   +2 more sources

Augmenting integrity and scalability in mobile payment applications using blockchain [PDF]

open access: yesE3S Web of Conferences, 2021
The transactional information from the mobile wallets is offloaded from the mobile device to the mobile transaction server. The transaction involves various communication standards, confidential transaction information to ensure flawless transaction of ...
David Shibin   +3 more
doaj   +1 more source

Securing Financial Transactions with a Robust Algorithm: Preventing Double-Spending Attacks

open access: yesComputers, 2023
A zero-confirmation transaction is a transaction that has not yet been confirmed on the blockchain and is not yet part of the blockchain. The network propagates zero-confirmation transactions quickly, but they are not secured against double-spending ...
Hasan Hashim   +5 more
doaj   +1 more source

POTENTIAL APPLICATION OF HARDWARE PROTECTED SYMMETRIC AUTHENTICATION MICROCIRCUITS TO ENSURE THE SECURITY OF INTERNET OF THINGS

open access: yesСучасні інформаційні системи, 2021
The paper objective is to determine the basic schemes and their characteristics for ensuring the security of Internet of Things nodes using symmetric authentication cryptographic microcircuits.
Petro Klimushin   +3 more
doaj   +1 more source

The Cost of Bitcoin Mining Has Never Really Increased

open access: yesFrontiers in Blockchain, 2020
The Bitcoin network is burning a large amount of energy for mining. In this paper, we estimate the lower bound for the global mining energy cost for a period of 10 years from 2010 to 2020, taking into account changes in energy costs, improvements in ...
Yo-Der Song   +3 more
doaj   +1 more source

G-DaM: A Distributed Data Storage with Blockchain Framework for Management of Groundwater Quality Data

open access: yesSensors, 2022
Groundwater overuse in different domains will eventually lead to global freshwater scarcity. To meet the anticipated demands, many governments worldwide are employing innovative and traditional techniques for forecasting groundwater availability by ...
Sukrutha L. T. Vangipuram   +3 more
doaj   +1 more source

Deck-Based Wide Block Cipher Modes and an Exposition of the Blinded Keyed Hashing Model

open access: yesIACR Transactions on Symmetric Cryptology, 2020
We present two tweakable wide block cipher modes from doubly-extendable cryptographic keyed (deck) functions and a keyed hash function: double-decker and docked-double-decker.
Aldo Gunsing, Joan Daemen, Bart Mennink
doaj   +1 more source

Bipartite Random Graphs and Cuckoo Hashing [PDF]

open access: yesDiscrete Mathematics & Theoretical Computer Science, 2006
The aim of this paper is to extend the analysis of Cuckoo Hashing of Devroye and Morin in 2003. In particular we make several asymptotic results much more precise.
Reinhard Kutzelnigg
doaj   +1 more source

Home - About - Disclaimer - Privacy