Results 81 to 90 of about 10,388,112 (269)

Quantum Security of Hash Functions and Property-Preservation of Iterated Hashing [PDF]

open access: yes, 2019
This work contains two major parts: comprehensively studying the security notions of cryptographic hash functions against quantum attacks and the relationships between them; and revisiting whether Merkle-Damgard and related iterated hash constructions preserve the security properties of the compression function in the quantum setting.
Ben Hamlin, Fang Song
openaire   +3 more sources

FSL-BM: Fuzzy Supervised Learning with Binary Meta-Feature for Classification

open access: yes, 2017
This paper introduces a novel real-time Fuzzy Supervised Learning with Binary Meta-Feature (FSL-BM) for big data classification task. The study of real-time algorithms addresses several major concerns, which are namely: accuracy, memory consumption, and ...
CP Chen   +15 more
core   +1 more source

A perceptual hash function to store and retrieve large scale DNA sequences

open access: yes, 2014
This paper proposes a novel approach for storing and retrieving massive DNA sequences.. The method is based on a perceptual hash function, commonly used to determine the similarity between digital images, that we adapted for DNA sequences.
Bailly, Xavier   +3 more
core  

Terminal power control method of power line carrier communication network based on adaptive hash function

open access: yesDianxin kexue, 2023
In the control of network terminal power, due to the overall low analysis of network state, the adaptive regulation ability of communication network terminal power is poor.Therefore, the power line carrier communication network terminal power control ...
Hong XUE   +4 more
doaj   +2 more sources

Development of a New Post-Quantum Digital Signature Algorithm: Syrga-1

open access: yesComputers
The distinguishing feature of hash-based algorithms is their high confidence in security. When designing electronic signature schemes, proofs of security reduction to certain properties of cryptographic hash functions are used.
Kunbolat Algazy   +3 more
doaj   +1 more source

Analysis of the Kupyna-256 Hash Function [PDF]

open access: yes, 2016
H2020 HECTOR ...
Dobraunig, Christoph   +2 more
openaire   +2 more sources

Enhanced payload volume in the least significant bits image steganography using hash function. [PDF]

open access: yesPeerJ Comput Sci, 2023
Ghadi YY   +5 more
europepmc   +1 more source

XML data integrity based on concatenated hash function [PDF]

open access: yes, 2009
Data integrity is the fundamental for data authentication. A major problem for XML data authentication is that signed XML data can be copied to another document but still keep signature valid. This is caused by XML data integrity protecting.
Liu, B, Lu, J, Yip, YJ
core  

An efficient and secure technique for image steganography using a hash function. [PDF]

open access: yesPeerJ Comput Sci, 2022
Nezami ZI   +5 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy