Results 241 to 250 of about 32,420 (268)
Some of the next articles are maybe not open access.

Efficient Construction of Infinite Length Hash Chains with Perfect Forward Secrecy Using Two Independent Hash Functions

Proceedings of the 11th International Conference on Security and Cryptography, 2014
One-way hash chains have been used to secure many applications over the last three decades. To overcome the fixed length limitation of first generation designs, so-called infinite length hash chains have been introduced. Such designs typically employ methods of asynchronous cryptography or hash based message authentication codes.
openaire   +1 more source

Weighted One-Way Hash Chain and Its Applications

2000
An one-way hash chain generated by the iterative use of a one-way hash function on a secret value has recently been widely employed to develop many practical cryptographic solutions, especially electronic micropayment schemes. In this paper, we propose a new concept called a weighted one-way hash chain. We then proceed to use the new concept to improve
Yen Sung-Ming, Yuliang Zheng
openaire   +1 more source

Scalable Hash Chain Traversal for Mobile Devices

2005
Yaron Sella recently proposed a scalable version of Jakobsson's algorithm to traverse a hash chain of size n. Given the hash chain and a computation limit m (k=m+1 and (b = $\sqrt[k]{n}$)), Sella's algorithm traverses the hash chain using a total of kb memory. We improve the memory usage to k(b–1).
openaire   +1 more source

A physical hash for preventing and detecting cyber-physical attacks in additive manufacturing systems

Journal of Manufacturing Systems, 2020
Logan Sturm   +2 more
exaly  

Hash Chain

2011
openaire   +1 more source

Home - About - Disclaimer - Privacy