Results 71 to 80 of about 2,808 (186)
An efficient secure predictive demand forecasting system using Ethereum virtual machine
The article is about predictive analysis on Ethereum virtual machine. Abstract Predictive demand forecasting plays a pivotal role in optimizing supply chain management, enabling businesses to effectively allocate resources and minimize operational inefficiencies.
Himani Saraswat +2 more
wiley +1 more source
Practical Preimage Attack on 5-Round Keccak[r=640, c=160]
Internal differential cryptanalysis has recently yielded a series of new results in the preimage cryptanalysis of round-reduced Keccak. While these existing attacks share a similar high-level framework, they differ in their technical details. This paper
Xiaoen Lin +6 more
doaj +1 more source
Rhythmic Keccak: SCA Security and Low Latency in HW
Glitches entail a great issue when securing a cryptographic implementation in hardware. Several masking schemes have been proposed in the literature that provide security even in the presence of glitches.
Victor Arribas +4 more
doaj +1 more source
Side-channel analysis of MAC-Keccak hardware implementations [PDF]
As Keccak has been selected as the new SHA-3 standard, Message Authentication Code (MAC) (MAC-Keccak) using a secret key will be widely used for integrity checking and authenticity assurance. Recent works have shown the feasibility of side-channel attacks against software implementations of MAC-Keccak to retrieve the key, with the security assessment ...
Pei Luo +5 more
openaire +1 more source
Internet of Things: Survey on Security and Privacy
The Internet of Things (IoT) is intended for ubiquitous connectivity among different entities or "things". While its purpose is to provide effective and efficient solutions, security of the devices and network is a challenging issue.
Mendez, Diego M. +2 more
core +1 more source
ArtProtect: Blockchain and NFC‐based anti‐counterfeit system for physical art
An anti‐counterfeiting system for physical art based on Ethereum blockchain and near‐field communication technology is proposed and implemented. The system leverages the use of Ethereum smart contracts and inter‐planetary file system to store artworks’ certificate of authenticity, and display them in a mobile app called ArtProtect.
Cindy Handoko Tantowibowo +1 more
wiley +1 more source
Optimization of preimage resistance on SHA-3 algorithm(SHA-3算法的抗原象攻击性能优化)
通过对SHA-3算法置换函数Keccak-f的线性性质以及缩减轮数的Keccak杂凑函数原象攻击的研究,提出了 SHA-3算法的抗原象攻击性能优化设计方案.首先结合Keccak杂凑函数的差分特点和θ置换函数的奇偶性质,分析了基于CP-kernel的SHA-3算法原象攻击;然后针对目前实施原象攻击的方法,在θ置换函数运算后异或随机数以打乱其汉明重量,改变CP-kernel的校验性质,阻止攻击者利用中间相遇的方法寻找原象,提高了 SHA-3 算法的抗原象攻击能力;最后利用VHDL硬件语言实现抗原象攻击SHA-
LIJianrui(李建瑞) +2 more
doaj +1 more source
Authentication protocols on restricted devices [PDF]
Tato práce se zabývá obecně autentizačními metodami, speciálně autentizací pomocí znalosti. Následně jsou stručně popsány MD hash funkce, SHA hash funkce, Keccak, Blake, Grostl, JH, Skein a uvedeno jejich srovnání na nízkovýkonových mikrokontrolérech. Do
Šebesta, David
core
Hardware authentication based on PUFs and SHA-3 2nd round candidates [PDF]
Security features are getting a growing interest in microelectronics. Not only entities have to authenticate in the context of a high secure communication but also the hardware employed has to be trusted.
Baturone Castillo, María Iluminada +1 more
core +1 more source
MedBlockSure: Blockchain‐based insurance system
Abstract Health insurance plays a vital role during medical emergencies in the coverage against medical expenses. Insurance fraud is an international challenge that affects most economies worldwide. Government and private companies offer many insurance schemes.
Charu Krishna +2 more
wiley +1 more source

