Results 41 to 50 of about 3,739 (238)

A resource efficient pseudo random number generator based on sawtooth maps for Internet of Things

open access: yesSECURITY AND PRIVACY, Volume 6, Issue 5, September/October 2023., 2023
Abstract The strength of cryptographic keys rely on the random number generators (RNGs) to produce random seed values. Unfortunately there are not many RNGs options suitable for Internet of Things (IoTs) scenario, due to limited processing resources and bulk quantity of IoT data that needs to be secured.
Unsub Zia   +4 more
wiley   +1 more source

Data Integrity and Security using Keccak and Digital Signature Algorithm (DSA)

open access: yesIJCCS (Indonesian Journal of Computing and Cybernetics Systems), 2019
Data security is a very important compilation using cloud computing; one of the research that is running and using cloud technology as a means of storage is G-Connect.
Muhammad Asghar Nazal   +2 more
doaj   +1 more source

Analysis of the Possibility of Using Selected Hash Functions Submitted for the SHA-3 Competition in the SDEx Encryption Method [PDF]

open access: yesInternational Journal of Electronics and Telecommunications, 2022
The paper presents analysis of the possibility of using selected hash functions submitted for the SHA-3 competition in the SDEx encryption method. The group of these functions will include the finalists of the SHA-3 competition, i.e.
Artur Hłobaż
doaj   +1 more source

A Standalone FPGA-based Miner for Lyra2REv2 Cryptocurrencies

open access: yes, 2020
Lyra2REv2 is a hashing algorithm that consists of a chain of individual hashing algorithms, and it is used as a proof-of-work function in several cryptocurrencies.
Balatsoukas-Stimming, Alexios   +4 more
core   +2 more sources

REISCH: incorporating lightweight and reliable algorithms into healthcare applications of WSNs [PDF]

open access: yes, 2020
Healthcare institutions require advanced technology to collect patients' data accurately and continuously. The tradition technologies still suffer from two problems: performance and security efficiency.
Al-Zubaidie, Mishall   +2 more
core   +2 more sources

Differential Propagation Analysis of Keccak [PDF]

open access: yes, 2012
In this paper we introduce new concepts that help read and understand low-weight differential trails in Keccak. We then propose efficient techniques to exhaustively generate all 3-round trails in its largest permutation below a given weight. This allows us to prove that any 6-round differential trail in Keccak-f[1600] has weight at least 74.
Joan Daemen, Gilles Van Assche
openaire   +1 more source

Comparison of power consumption in pipelined implementations of the BLAKE3 cipher in FPGA devices [PDF]

open access: yesInternational Journal of Electronics and Telecommunications
This article analyzes the dynamic power losses generated by various hardware implementations of the BLAKE3 hash function. Estimations of the parameters were based on the results of post-route simulations of designs implemented in Xilinx Spartan-7 FPGAs ...
Jarosław Sugier
doaj   +3 more sources

A complete SHA-3 hardware library based on a high efficiency Keccak design

open access: yesIEEE Nordic Circuits and Systems Conference, 2023
Hash functions are a crucial part of the cryptographic primitives. So much so that in 2007 a new competition was launched to select new standards for the SHA-3 function, which was won by Keccak. Since then, many software and hardware implementations have
Eros Camacho-Ruiz   +3 more
semanticscholar   +1 more source

Asymptotic Analysis of Plausible Tree Hash Modes for SHA-3 [PDF]

open access: yes, 2017
Discussions about the choice of a tree hash mode of operation for a standardization have recently been undertaken. It appears that a single tree mode cannot address adequately all possible uses and specifications of a system. In this paper, we review the
Atighehchi, Kevin, Bonnecaze, Alexis
core   +3 more sources

Multi-Core Dataflow Design and Implementation of Secure Hash Algorithm-3

open access: yesIEEE Access, 2018
Embedded multi-core systems are implemented as systems-on-chip that rely on packet storeand-forward networks-on-chip for communications. These systems do not use buses or global clock.
Ali Alzahrani, Fayez Gebali
doaj   +1 more source

Home - About - Disclaimer - Privacy