Results 41 to 50 of about 2,808 (186)

High Throughput Implementation of the Keccak Hash Function Using the Nios-II Processor

open access: yesTechnologies, 2020
Presently, cryptographic hash functions play a critical role in many applications, such as digital signature systems, security communications, protocols, and network security infrastructures.
Argyrios Sideris   +2 more
doaj   +1 more source

A Tale of Snakes and Horses: Amplifying Correlation Power Analysis on Quadratic Maps

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2023
We study the success probabilities of two variants of Correlation Power Analysis (CPA) to retrieve multiple secret bits. The target is a permutation-based symmetric cryptographic construction with a quadratic map as an S-box. More precisely, we focus on
Anna Guinet   +3 more
doaj   +1 more source

Rotational Cryptanalysis of Round-Reduced Keccak [PDF]

open access: yes, 2014
In this paper we attack round-reduced Keccak hash function with a technique called rotational cryptanalysis. We focus on Keccak variants proposed as SHA-3 candidates in the NIST’s contest for a new standard of cryptographic hash function. Our main result is a preimage attack on 4-round Keccak and a 5-round distinguisher on Keccak-\(f\)[1600 ...
Morawiecki, Pawel   +2 more
openaire   +2 more sources

A Lyra2 FPGA Core for Lyra2REv2-Based Cryptocurrencies

open access: yes, 2019
Lyra2REv2 is a hashing algorithm that consists of a chain of individual hashing algorithms and it is used as a proof-of-work function in several cryptocurrencies that aim to be ASIC-resistant.
Balatsoukas-Stimming, Alexios   +3 more
core   +1 more source

A Blockchain‐Driven Approach to Enhancing Transparency and Traceability in Organic Food Supply Chain Management

open access: yesApplied Computational Intelligence and Soft Computing, Volume 2026, Issue 1, 2026.
This paper proposes a novel blockchain‐based system designed to revolutionize transparency, traceability, and reliability within the organic food supply chain. Addressing persistent challenges such as certification fraud, opaque supply chains, and the high costs associated with organic food production, stakeholders including farmers, processors ...
Youness Riouali   +2 more
wiley   +1 more source

Criticality Aware Soft Error Mitigation in the Configuration Memory of SRAM based FPGA

open access: yes, 2018
Efficient low complexity error correcting code(ECC) is considered as an effective technique for mitigation of multi-bit upset (MBU) in the configuration memory(CM)of static random access memory (SRAM) based Field Programmable Gate Array (FPGA) devices ...
Chakrabarti, Amlan   +4 more
core   +1 more source

Evolution and Detection of Polymorphic and Metamorphic Malwares: A Survey [PDF]

open access: yes, 2015
Malwares are big threat to digital world and evolving with high complexity. It can penetrate networks, steal confidential information from computers, bring down servers and can cripple infrastructures etc.
Sahay, S. K., Sharma, Ashu
core   +1 more source

Towards quantum‐safe blockchain: Exploration of PQC and public‐key recovery on embedded systems

open access: yesIET Blockchain, Volume 5, Issue 1, January/December 2025.
This paper addresses the need for quantum‐safe blockchain solutions specifically for embedded systems by integrating Post‐Quantum Cryptography (PQC) into blockchain frameworks. We propose a quantum‐secure blockchain architecture using NIST‐standardized PQC algorithms, finding Falcon‐512 to be optimal for embedded environments due to its security and ...
Dominik Marchsreiter
wiley   +1 more source

Applying Grover's Algorithm to Hash Functions: A Software Perspective

open access: yesIEEE Transactions on Quantum Engineering, 2022
Quantum software frameworks provide software engineers with the tools to study quantum algorithms as applied to practical problems. We implement classical hash functions MD5, SHA-1, SHA-2, and SHA-3 as quantum oracles to study the computational resource ...
Richard H. Preston
doaj   +1 more source

Differential-Aided Preimage Attacks On Round-Reduced Keccak

open access: yesThe Computer Journal, 2022
Abstract At FSE 2008, Leurent introduced the preimage attack on MD4 by exploiting differential trails. In this paper, we apply the differential-aided preimage attack to Keccak with the message modification techniques. Instead of directly finding the preimage, we exploit differential characteristics to modify the messages, so that the ...
Congming Wei   +4 more
openaire   +1 more source

Home - About - Disclaimer - Privacy