Results 21 to 30 of about 11,893 (260)

Integrity verification for digital Holy Quran verses using cryptographic hash function and compression

open access: yesJournal of King Saud University: Computer and Information Sciences, 2020
Data Integrity is one of the primary concepts in information security. The main task of the cryptographic hash function is to assure the integrity of the transmitted data.
Mishal Almazrooie   +5 more
doaj   +1 more source

Cryptographic Hash Functions: [PDF]

open access: yesIEICE ESS Fundamentals Review, 2010
Cryptographic hash functions are an important tool of cryptography and play a fundamental role in efficient and secure information processing. A hash function processes an arbitrary finite length input message to a fixed length output referred to as the hash value.
Kan YASUDA, Yu SASAKI
openaire   +4 more sources

Universal hash functions from quantum procedures

open access: yesУчёные записки Казанского университета: Серия Физико-математические науки, 2020
Modern quantum technologies are NISQ (Noisy Intermediate-Scale Quantum) devices, which are used to create insufficiently accurate quantum computers with low computing power.
F.M. Ablayev, M.T. Ziatdinov
doaj   +1 more source

A Novel Hash Function Based on a Chaotic Sponge and DNA Sequence

open access: yesIEEE Access, 2021
Many chaos-based hash functions have convoluted designs that are not based on proper design principles, complicating the verification of security claims.
Moatsum Alawida   +5 more
doaj   +1 more source

Dispersing hash functions

open access: yesRandom Structures & Algorithms, 2000
AbstractWe define a family of functions F from a domain U to a range R to be dispersing if for every set S ⊆ U of a certain size and random h ∈ F, the expected value of ∣S∣ – ∣h[S]∣ is not much larger than the expectation if h had been chosen at random from the set of all functions from U to R.We give near‐optimal upper and lower bounds on the size of ...
openaire   +2 more sources

Can There Be a Two Way Hash Function?

open access: yesIEEE Access
It is computationally impossible for one-way hash functions to obtain the original data again. In this study, Two Way Hash Function (TWHF) is proposed which provides the security properties of one-way hash functions. TWHF aims to hash/encrypt and decrypt
Timucin Koroglu, Refik Samet
doaj   +1 more source

Fast Counterfeit RFID Tags Detection With Slot Constraints

open access: yesIEEE Access, 2023
RFID tags are prone to counterfeit attacks in supply chain scenarios. The attacker often uses counterfeit tags to replace stolen tags to avoid being detected by the inventory process.
Bing Zhang, Xu Hu, Shan Gao
doaj   +1 more source

Synonym‐based multi‐keyword ranked search with secure k‐NN in 6G network

open access: yesIET Networks, EarlyView., 2022
Abstract Sixth Generation (6G) integrates the next generation communication systems such as maritime, terrestrial, and aerial to offer robust network and massive device connectivity with ultra‐low latency requirement. The cutting edge technologies such as artificial intelligence, quantum machine learning, and millimetre enable hyper‐connectivity to ...
Deebak Bakkiam David, Fadi Al‐Turjman
wiley   +1 more source

Hash Functions Using Chaotic Iterations

open access: yesJournal of Algorithms & Computational Technology, 2010
In this paper, a novel formulation of discrete chaotic iterations in the field of dynamical systems is given. Their topological properties are studied: it is mathematically proven that, under some conditions, these iterations have a chaotic behavior as ...
Jacques M. Bahi, Christophe Guyeux
doaj   +1 more source

Deck-Based Wide Block Cipher Modes and an Exposition of the Blinded Keyed Hashing Model

open access: yesIACR Transactions on Symmetric Cryptology, 2020
We present two tweakable wide block cipher modes from doubly-extendable cryptographic keyed (deck) functions and a keyed hash function: double-decker and docked-double-decker.
Aldo Gunsing, Joan Daemen, Bart Mennink
doaj   +1 more source

Home - About - Disclaimer - Privacy