Results 201 to 210 of about 65,979 (233)
When less is more: sketching with minimizers in genomics. [PDF]
Ndiaye M+8 more
europepmc +1 more source
RWA-BFT: Reputation-Weighted Asynchronous BFT for Large-Scale IoT. [PDF]
Jia G, Shen Z, Sun H, Xin J, Wang D.
europepmc +1 more source
Efficient multicast source authentification using layered hash-chaining scheme
Yacine Challal+2 more
openalex +1 more source
Smart Contracts and Shared Platforms in Sustainable Health Care: Systematic Review.
Marino CA, Diaz Paz C.
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Determining Minimum Hash Width for Hash Chains
Proceedings of the Third Central European Cybersecurity Conference, 2019Cryptographic hash functions are used in authentication, and repeated application in hash chains is used in communication protocols. In embedded devices, the width of hash values and the associated effort to evaluate the hash function is crucial, and hence the hash values should be as short as possible but should still be sufficient to guarantee the ...
Martin Dietzfelbinger, Jörg Keller
openaire +2 more sources
Hash Function Vulnerability Index and Hash Chain Attacks [PDF]
A hash chain is constructed by repeated hashing from an initial value. While it finds applications for network protocol design it also poses threats to hash function one-way and collision-free properties. We investigate the complexity of breaking hash function security properties by hash chain attacks using probabilistic algorithms.
openaire +1 more source
Infinite length hash chains and their applications
Proceedings. Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2003Hash chains are used extensively in various cryptography applications such as one-time passwords, server-supported signatures and micropayments. In this paper, we present a method, called infinite length hash chains to improve the flexibility of this chaining idea by using public-key techniques.
Bicakci, K, Baykal, Nazife
openaire +3 more sources
Hash chains with diminishing ranges for sensors
International Journal of High Performance Computing and Networking, 2004Sensors and other constrained devices periodically transmit small information packets motivating the study of hash chains with small domains and ranges. Hash chain based protocols use deferred disclosure and it is often assumed their hash functions are one-way, thus essentially unbreakable.
Phillip G. Bradford, O.V. Gavrylyako
openaire +3 more sources