Results 11 to 20 of about 2,377,005 (278)
Comparative Experiments of V2X Security Protocol Based on Hash Chain Cryptography. [PDF]
Vehicle-to-everything (V2X) is the communication technology designed to support road safety for drivers and autonomous driving. The light-weight security solution is crucial to meet the real-time needs of on-board V2X applications.
Hakeem SAA, El-Gawad MAA, Kim H.
europepmc +2 more sources
Efficient Constructions for One-way Hash Chains [PDF]
Abstract: "One-way chains are an important cryptographic primitive in many security applications. Lamport first proposed to use one-way chains for one-time password authentication [19]. Subsequently, researchers proposed one-way chains as a basic building block for digital cash, for extending the lifetime of digital certificates, for constructing one ...
Yih‐Chun Hu +2 more
openalex +4 more sources
Authentication algorithms in the form of cryptographic schemes, such as the Secure Hash Algorithm 1 (SHA-1) and the digital signature algorithm (DSA), specified in the current variable message format (VMF) military standard have numerous reliability ...
Dohoon Kim +4 more
doaj +2 more sources
Individual displacements in hashing with coalesced chains [PDF]
We study the asymptotic distribution of the displacements in hashing with coalesced chains, for both late-insertion and early-insertion. Asymptotic formulas for means and variances follow. The method uses Poissonization and some stochastic calculus.
Svante Janson
openalex +5 more sources
Selective Location Blinding Using Hash Chains [PDF]
Location-based applications require a user's movements and positions to provide customized services. However, location is a sensitive piece of information that should not be revealed unless strictly necessary. In this paper we propose a procedure that allows a user to control the precision in which his location information is exposed to a service ...
Gabriele Lenzini, Sjouke Mauw, Jun Pang
openalex +5 more sources
Hey, That's My Model! Introducing Chain & Hash, An LLM Fingerprinting Technique [PDF]
Growing concerns over the theft and misuse of Large Language Models (LLMs) have heightened the need for effective fingerprinting, which links a model to its original version to detect misuse.
Mark Russinovich, Ahmed Salem
openalex +2 more sources
Digital signatures over hash-entangled chains [PDF]
In this work we introduce a new approach for digital signature based on hash chains. The method is supported on the well known security principles of hash functions. Some main advantages of this public key system include security and estimated efficiency through the so called signature chains.
Luis Adrián Lizama-Pérez
openalex +3 more sources
Reversible and Plausibly Deniable Covert Channels in One-Time Passwords Based on Hash Chains [PDF]
Covert channels enable stealthy communications over innocent appearing carriers. They are increasingly applied in the network context. However, little work is available that exploits cryptographic primitives in the networking context to establish such ...
Jörg Keller, Steffen Wendzel
doaj +2 more sources
Migration mechanism of heterogeneous memory pages using a two-way Hash chain list [PDF]
With the rapid development of big data technologies, the requirements of tremendously accessing memory are increasing, therebyresulting in a serious problem of high consumption power by accessing traditional DRAM memory.
Yanfei Ji +3 more
openalex +2 more sources
Separate Chaining Meets Compact Hashing
Preprint of the local proceedings of the 173th SIGAL ...
Dominik Köppl
openalex +4 more sources

