Results 21 to 30 of about 2,100,258 (259)
Chameleon: a Blind Double Trapdoor Hash Function for Securing AMI Data Aggregation [PDF]
Data aggregation is an integral part of Advanced Metering Infrastructure (AMI) deployment that is implemented by the concentrator. Data aggregation reduces the number of transmissions, thereby reducing communication costs and increasing the bandwidth ...
Keoh, Sye Loong+5 more
core +3 more sources
Some Plausible Constructions of Double-Block-Length Hash Functions [PDF]
In this article, it is discussed how to construct a compression function with 2 n-bit output using a component function with n-bit output. The component function is either a smaller compression function or a block cipher. Some constructions are presented which compose collision-resistant hash functions: Any collision-finding attack on them is at most ...
Shoichi Hirose
openalex +3 more sources
Attacks on Fast Double Block Length Hash Functions [PDF]
The security of hash functions based on a block cipher with a block length of m bits and a key length of k bits, where $k\leq m$ , is considered. New attacks are presented on a large class of iterated hash functions with a 2m -bit hash result which processes in each iteration two message blocks using two encryptions.
Lars R. Knudsen+2 more
openalex +3 more sources
Instance selection for big data based on locally sensitive hashing and double-voting mechanism [PDF]
Junhai Zhai, Yajie Huang
openalex +2 more sources
Blockcipher-Based Double-Length Hash Functions for Pseudorandom Oracles [PDF]
PRO (Pseudorandom Oracle) is an important security of hash functions because it ensures that the PRO hash function inherits all properties of a random oracle in single stage games up to the PRO bound (e.g., collision resistant security, preimage resistant security and so on). In this paper, we propose new blockcipher-based double-length hash functions,
Yusuke Naito
openalex +3 more sources
Augmenting integrity and scalability in mobile payment applications using blockchain [PDF]
The transactional information from the mobile wallets is offloaded from the mobile device to the mobile transaction server. The transaction involves various communication standards, confidential transaction information to ensure flawless transaction of ...
David Shibin+3 more
doaj +1 more source
Securing Financial Transactions with a Robust Algorithm: Preventing Double-Spending Attacks
A zero-confirmation transaction is a transaction that has not yet been confirmed on the blockchain and is not yet part of the blockchain. The network propagates zero-confirmation transactions quickly, but they are not secured against double-spending ...
Hasan Hashim+5 more
doaj +1 more source
The paper objective is to determine the basic schemes and their characteristics for ensuring the security of Internet of Things nodes using symmetric authentication cryptographic microcircuits.
Petro Klimushin+3 more
doaj +1 more source
Electron contact interlayers for low‐temperature‐processed crystalline silicon solar cells
In this study, a series of interlayers are trialed as electron‐selective contacts on crystalline silicon, including several materials that were previously untested in this application. Most of these interlayers were found to achieve mΩcm2‐scale specific contact resistivities.
Jesus Ibarra Michel+11 more
wiley +1 more source
Groundwater overuse in different domains will eventually lead to global freshwater scarcity. To meet the anticipated demands, many governments worldwide are employing innovative and traditional techniques for forecasting groundwater availability by ...
Sukrutha L. T. Vangipuram+3 more
doaj +1 more source