Results 91 to 100 of about 2,808 (186)

SwarmAd: A decentralised content management system

open access: yesIET Cyber-Physical Systems: Theory &Applications, Volume 9, Issue 2, Page 102-114, June 2024.
Swarm ad is a system that allows creating online communites while guaranteeing: (1) a completely decentralised architecture, (2) automated management, (3) data safety and (4) data sovereignety. Abstract Online presence is becoming an important part of everyday's life and online communities may represent a significant source of engagement for the ...
Tommaso Baldo, Mauro Migliardi
wiley   +1 more source

A survey on post‐quantum based approaches for edge computing security

open access: yesWIREs Computational Statistics, Volume 16, Issue 1, January/February 2024.
The distribution of reviewed papers by focused area. Abstract With the development of technology and its integration with scientific realities, computer systems continue to evolve as infrastructure. One of the most important obstacles in front of quantum computers with high‐speed processing is that its existing systems cause security vulnerabilities ...
Aykut Karakaya, Ahmet Ulu
wiley   +1 more source

Throughput Optimum Architecture of KECCAK Hash Function

open access: yesInternational Journal of Computer and Electrical Engineering, 2012
Because of the weakening of the widely-used SHA-1 hash algorithm and concerns over the similarly-structured algorithms of the SHA-2 family; the US NIST has initiated the SHA-3 contest in order to select a suitable drop-in replacement. In this paper we use the unrolling method to describe the high-speed hardware implementation of the SHA-3 hash function
A. Gholipour, S. Mirzakuchaki
openaire   +1 more source

Superposition Attacks on Pseudorandom Schemes Based on Two or Less Permutations

open access: yesIET Information Security, Volume 2024, Issue 1, 2024.
We study quantum superposition attacks against permutation‐based pseudorandom cryptographic schemes. We first extend Kuwakado and Morii’s attack against the Even–Mansour cipher and exhibit key recovery attacks against a large class of pseudorandom schemes based on a single call to an n‐bit permutation, with polynomial O(n) (or O(n2), if the concrete ...
Shaoxuan Zhang   +3 more
wiley   +1 more source

New techniques for trail bounds and application to differential trails in Keccak

open access: yesIACR Transactions on Symmetric Cryptology, 2017
We present new techniques to efficiently scan the space of high-probability differential trails in bit-oriented ciphers. Differential trails consist in sequences of state patterns that we represent as ordered lists of basic components in order to arrange
Silvia Mella   +2 more
doaj   +1 more source

Elliptic‐Curve Cryptography Implementation on RISC‐V Processors for Internet of Things Applications

open access: yesJournal of Engineering, Volume 2024, Issue 1, 2024.
Elliptic‐curve cryptography (ECC) is a popular technique of public‐key cryptography used for secure communications in Internet of Things (IoT) applications. In this study, the implementation and analyze the Elliptic Curve Digital Signature Algorithm (ECDSA) with NIST‐256 on MicroBlaze processors based on RISC‐V architecture. This implementation aims to
Preethi Preethi   +6 more
wiley   +1 more source

PDFS: Practical Data Feed Service for Smart Contracts

open access: yes, 2019
Smart contracts are a new paradigm that emerged with the rise of the blockchain technology. They allow untrusting parties to arrange agreements. These agreements are encoded as a programming language code and deployed on a blockchain platform, where all ...
D Bayer   +6 more
core   +1 more source

Optimized Software Implementation of Keccak, Kyber, and Dilithium on RV{32,64}IM{B}{V}

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
With the standardization of NIST post-quantum cryptographic (PQC) schemes, optimizing these PQC schemes across various platforms presents significant research value. While most existing software implementation efforts have concentrated on ARM platforms,
Jipeng Zhang   +3 more
doaj   +1 more source

Rtl Implementation Of Secure Hash Algorithm 3 (Sha-3) Towards Smaller Area [PDF]

open access: yes, 2017
Secure data transfer has been the most challenging task for Internet of Things (IoT) devices. Data integrity must be ensured before and after the data transmission.
Lim , Yen Ruen
core  

An Alternative Paradigm for Developing and Pricing Storage on Smart Contract Platforms

open access: yes, 2019
Smart contract platforms facilitate the development of important and diverse distributed applications in a simple manner. This simplicity stems from the inherent utility of employing the state of smart contracts to store, query and verify the validity of
Patsonakis, Christos, Roussopoulos, Mema
core   +1 more source

Home - About - Disclaimer - Privacy