Results 91 to 100 of about 3,739 (238)
Rtl Implementation Of Secure Hash Algorithm 3 (Sha-3) Towards Smaller Area [PDF]
Secure data transfer has been the most challenging task for Internet of Things (IoT) devices. Data integrity must be ensured before and after the data transmission.
Lim , Yen Ruen
core
MedBlockSure: Blockchain‐based insurance system
Abstract Health insurance plays a vital role during medical emergencies in the coverage against medical expenses. Insurance fraud is an international challenge that affects most economies worldwide. Government and private companies offer many insurance schemes.
Charu Krishna +2 more
wiley +1 more source
Barrel Shifter Physical Unclonable Function Based Encryption
Physical Unclonable Functions (PUFs) are circuits designed to extract physical randomness from the underlying circuit. This randomness depends on the manufacturing process.
Dee, Timothy +2 more
core +1 more source
Abstract This article presents the design and implementation of a reliable computing virtual container‐based model with integrity verification for data processing strategies named the reliability and integrity verification (RIV) scheme. It has been integrated into a system construction model as well as existing workflow engines (e.g., Kulla and ...
Hugo G. Reyes‐Anastacio +4 more
wiley +1 more source
Toward designing a lightweight RFID authentication protocol for constrained environments
Our article investigates the vulnerabilities of lightweight RFID authentication schemes, namely LRSAS+ and LRARP+, and proposes an enhanced version leveraging the χper$\chi per$ function to address their weaknesses. Through formal analysis and comparison with contemporary systems, we demonstrate that the improved scheme achieves robust security while ...
Nasser Zarbi +3 more
wiley +1 more source
Implementation of cryptographic primitives [PDF]
Tato semestrální práce je zaměřena na kryptografické metody. Část se věnuje blokovým šifrám, kde popisuje algoritmy Blowfish a 3DES. Dále se zabývá hashovacími funkcemi, z nich podrobně rozebírá algoritmy SHA-3 a Tiger.This semestral thesis is focused on
Jégrová, Eliška
core
Higher-Order Side-Channel Protected Implementations of KECCAK
The efficient protection of security critical devices against side-channel analysis attacks is a fundamental need in the age of Internet of Things and ubiquitous computing. In this work, we introduce a configurable hardware design of KECCAK (SHA-3) which can be tailored to fulfill the needs of a wide range of different applications.
Gross, Hannes +2 more
openaire +2 more sources
SwarmAd: A decentralised content management system
Swarm ad is a system that allows creating online communites while guaranteeing: (1) a completely decentralised architecture, (2) automated management, (3) data safety and (4) data sovereignety. Abstract Online presence is becoming an important part of everyday's life and online communities may represent a significant source of engagement for the ...
Tommaso Baldo, Mauro Migliardi
wiley +1 more source
Grayscale Image Authentication using Neural Hashing
Many different approaches for neural network based hash functions have been proposed. Statistical analysis must correlate security of them. This paper proposes novel neural hashing approach for gray scale image authentication.
Kutlu, Yakup, Yayık, Apdullah
core +2 more sources
09031 Abstracts Collection -- Symmetric Cryptography [PDF]
From 11.01.09 to 16.01.09, the Seminar 09031 in ``Symmetric Cryptography \u27\u27 was held in Schloss Dagstuhl~--~Leibniz Center for Informatics. During the seminar, several participants presented their current research, and ongoing work and open ...
Handschuh, Helena +3 more
core +1 more source

