Results 91 to 100 of about 3,739 (238)

Rtl Implementation Of Secure Hash Algorithm 3 (Sha-3) Towards Smaller Area [PDF]

open access: yes, 2017
Secure data transfer has been the most challenging task for Internet of Things (IoT) devices. Data integrity must be ensured before and after the data transmission.
Lim , Yen Ruen
core  

MedBlockSure: Blockchain‐based insurance system

open access: yesCognitive Computation and Systems, Volume 6, Issue 4, Page 98-107, December 2024.
Abstract Health insurance plays a vital role during medical emergencies in the coverage against medical expenses. Insurance fraud is an international challenge that affects most economies worldwide. Government and private companies offer many insurance schemes.
Charu Krishna   +2 more
wiley   +1 more source

Barrel Shifter Physical Unclonable Function Based Encryption

open access: yes, 2017
Physical Unclonable Functions (PUFs) are circuits designed to extract physical randomness from the underlying circuit. This randomness depends on the manufacturing process.
Dee, Timothy   +2 more
core   +1 more source

Kulla‐RIV: A composing model with integrity verification for efficient and reliable data processing services

open access: yesSoftware: Practice and Experience, Volume 54, Issue 8, Page 1516-1542, August 2024.
Abstract This article presents the design and implementation of a reliable computing virtual container‐based model with integrity verification for data processing strategies named the reliability and integrity verification (RIV) scheme. It has been integrated into a system construction model as well as existing workflow engines (e.g., Kulla and ...
Hugo G. Reyes‐Anastacio   +4 more
wiley   +1 more source

Toward designing a lightweight RFID authentication protocol for constrained environments

open access: yesIET Communications, Volume 18, Issue 14, Page 846-859, August 2024.
Our article investigates the vulnerabilities of lightweight RFID authentication schemes, namely LRSAS+ and LRARP+, and proposes an enhanced version leveraging the χper$\chi per$ function to address their weaknesses. Through formal analysis and comparison with contemporary systems, we demonstrate that the improved scheme achieves robust security while ...
Nasser Zarbi   +3 more
wiley   +1 more source

Implementation of cryptographic primitives [PDF]

open access: yes, 2015
Tato semestrální práce je zaměřena na kryptografické metody. Část se věnuje blokovým šifrám, kde popisuje algoritmy Blowfish a 3DES. Dále se zabývá hashovacími funkcemi, z nich podrobně rozebírá algoritmy SHA-3 a Tiger.This semestral thesis is focused on
Jégrová, Eliška
core  

Higher-Order Side-Channel Protected Implementations of KECCAK

open access: yes2017 Euromicro Conference on Digital System Design (DSD), 2017
The efficient protection of security critical devices against side-channel analysis attacks is a fundamental need in the age of Internet of Things and ubiquitous computing. In this work, we introduce a configurable hardware design of KECCAK (SHA-3) which can be tailored to fulfill the needs of a wide range of different applications.
Gross, Hannes   +2 more
openaire   +2 more sources

SwarmAd: A decentralised content management system

open access: yesIET Cyber-Physical Systems: Theory &Applications, Volume 9, Issue 2, Page 102-114, June 2024.
Swarm ad is a system that allows creating online communites while guaranteeing: (1) a completely decentralised architecture, (2) automated management, (3) data safety and (4) data sovereignety. Abstract Online presence is becoming an important part of everyday's life and online communities may represent a significant source of engagement for the ...
Tommaso Baldo, Mauro Migliardi
wiley   +1 more source

Grayscale Image Authentication using Neural Hashing

open access: yes, 2016
Many different approaches for neural network based hash functions have been proposed. Statistical analysis must correlate security of them. This paper proposes novel neural hashing approach for gray scale image authentication.
Kutlu, Yakup, Yayık, Apdullah
core   +2 more sources

09031 Abstracts Collection -- Symmetric Cryptography [PDF]

open access: yes, 2009
From 11.01.09 to 16.01.09, the Seminar 09031 in ``Symmetric Cryptography \u27\u27 was held in Schloss Dagstuhl~--~Leibniz Center for Informatics. During the seminar, several participants presented their current research, and ongoing work and open ...
Handschuh, Helena   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy