Results 61 to 70 of about 2,808 (186)

Optimized Design and Implementation of CRYSTALS‐KYBER Based on MLWE

open access: yesSecurity and Communication Networks, Volume 2025, Issue 1, 2025.
CRYSTALS‐KYBER is a postquantum key exchange mechanism based on the MLWE problem. At present, it is a major challenge to realize CRYSTALS‐KYBER with high‐performance and low‐resource consumption on the FPGA platform. The design proposed in this paper aims at the high efficiency implementation of CRYSTALS‐KYBER based on the MLWE scheme.
Song Cheng   +7 more
wiley   +1 more source

Parallel and High Speed Hashing in GPU for Telemedicine Applications

open access: yesIEEE Access, 2018
With the advent of a telemedicine technology, many medical services can be provided remotely, which greatly enhances the welfare of our mankind. However, security and privacy of medical data transmitted through telecommunication systems remain a serious ...
Wai-Kong Lee   +5 more
doaj   +1 more source

Finding Collisions against 4-Round SHA-3-384 in Practical Time

open access: yesIACR Transactions on Symmetric Cryptology, 2022
The Keccak sponge function family, designed by Bertoni et al. in 2007, was selected by the U.S. National Institute of Standards and Technology (NIST) in 2012 as the next generation of Secure Hash Algorithm (SHA-3).
Senyang Huang   +3 more
doaj   +1 more source

Unaligned Rebound Attack: Application to Keccak [PDF]

open access: yes, 2012
We analyze the internal permutations of Keccak, one of the NIST SHA-3 competition finalists, in regard to differential properties. By carefully studying the elements composing those permutations, we are able to derive most of the best known differential paths for up to 5 rounds. We use these differential paths in a rebound attack setting and adapt this
Alexandre Duc   +3 more
openaire   +1 more source

Optimization of Tree Modes for Parallel Hash Functions: A Case Study [PDF]

open access: yes, 2017
This paper focuses on parallel hash functions based on tree modes of operation for an inner Variable-Input-Length function. This inner function can be either a single-block-length (SBL) and prefix-free MD hash function, or a sponge-based hash function ...
Atighehchi, Kevin, Rolland, Robert
core   +1 more source

Bilevel access control and constraint‐aware response provisioning in edge‐enabled software defined network‐internet of things network using the safeguard authentication dynamic access control model

open access: yesInternational Journal of Communication Systems, Volume 37, Issue 18, December 2024.
A centralized controller vulnerable to attacks is one of the security vulnerabilities and scalability issues faced by the Internet of Things (IoT)‐connected software‐defined network (SDN). Safeguard Authentication Dynamic Access Control (SANDMAC) tackles these issues by emphasizing secure access control and user and application authentication ...
Sahana D S, Brahmananda S H
wiley   +1 more source

Column Parity Mixers

open access: yesIACR Transactions on Symmetric Cryptology, 2018
We present column parity mixers (CPM), a generalization of the Θ mixing layer that is used in Keccak. Thanks to our description using matrix arithmetic, we can easily derive algebraic, diffusion, and mask propagation properties, leading to a surprising ...
Ko Stoffelen, Joan Daemen
doaj   +1 more source

MiMC:Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity [PDF]

open access: yes, 2016
We explore cryptographic primitives with low multiplicative complexity. This is motivated by recent progress in practical applications of secure multi-party computation (MPC), fully homomorphic encryption (FHE), and zero-knowledge proofs (ZK) where ...
Albrecht, Martin   +4 more
core   +4 more sources

An on‐chain trading model of real world asset backed digital assets

open access: yesIET Blockchain, Volume 4, Issue 4, Page 315-323, December 2024.
To bridge this gap between off‐chain and on‐chain economic systems, an on‐chain trading model was developed by leveraging key techniques, including HD key derivation, tokenization, oracle, DEX, parallel transactions based on DAG model. Abstract Metaverse is a digital value interaction network based on blockchain technology, with an important economic ...
Dongsheng Hou   +5 more
wiley   +1 more source

In-Memory Computation Based Mapping of Keccak-f Hash Function

open access: yesFrontiers in Nanotechnology, 2022
Cryptographic hash functions play a central role in data security for applications such as message authentication, data verification, and detecting malicious or illegal modification of data.
Sandeep Kaur Kingra   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy