Results 71 to 80 of about 2,808 (186)

An efficient secure predictive demand forecasting system using Ethereum virtual machine

open access: yesIET Blockchain, Volume 4, Issue S1, Page 526-542, December 2024.
The article is about predictive analysis on Ethereum virtual machine. Abstract Predictive demand forecasting plays a pivotal role in optimizing supply chain management, enabling businesses to effectively allocate resources and minimize operational inefficiencies.
Himani Saraswat   +2 more
wiley   +1 more source

Practical Preimage Attack on 5-Round Keccak[r=640, c=160]

open access: yesIACR Transactions on Symmetric Cryptology
Internal differential cryptanalysis has recently yielded a series of new results in the preimage cryptanalysis of round-reduced Keccak. While these existing attacks share a similar high-level framework, they differ in their technical details. This paper
Xiaoen Lin   +6 more
doaj   +1 more source

Rhythmic Keccak: SCA Security and Low Latency in HW

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2018
Glitches entail a great issue when securing a cryptographic implementation in hardware. Several masking schemes have been proposed in the literature that provide security even in the presence of glitches.
Victor Arribas   +4 more
doaj   +1 more source

Side-channel analysis of MAC-Keccak hardware implementations [PDF]

open access: yesProceedings of the Fourth Workshop on Hardware and Architectural Support for Security and Privacy, 2015
As Keccak has been selected as the new SHA-3 standard, Message Authentication Code (MAC) (MAC-Keccak) using a secret key will be widely used for integrity checking and authenticity assurance. Recent works have shown the feasibility of side-channel attacks against software implementations of MAC-Keccak to retrieve the key, with the security assessment ...
Pei Luo   +5 more
openaire   +1 more source

Internet of Things: Survey on Security and Privacy

open access: yes, 2017
The Internet of Things (IoT) is intended for ubiquitous connectivity among different entities or "things". While its purpose is to provide effective and efficient solutions, security of the devices and network is a challenging issue.
Mendez, Diego M.   +2 more
core   +1 more source

ArtProtect: Blockchain and NFC‐based anti‐counterfeit system for physical art

open access: yesIET Blockchain, Volume 4, Issue 4, Page 423-442, December 2024.
An anti‐counterfeiting system for physical art based on Ethereum blockchain and near‐field communication technology is proposed and implemented. The system leverages the use of Ethereum smart contracts and inter‐planetary file system to store artworks’ certificate of authenticity, and display them in a mobile app called ArtProtect.
Cindy Handoko Tantowibowo   +1 more
wiley   +1 more source

Optimization of preimage resistance on SHA-3 algorithm(SHA-3算法的抗原象攻击性能优化)

open access: yesZhejiang Daxue xuebao. Lixue ban, 2016
通过对SHA-3算法置换函数Keccak-f的线性性质以及缩减轮数的Keccak杂凑函数原象攻击的研究,提出了 SHA-3算法的抗原象攻击性能优化设计方案.首先结合Keccak杂凑函数的差分特点和θ置换函数的奇偶性质,分析了基于CP-kernel的SHA-3算法原象攻击;然后针对目前实施原象攻击的方法,在θ置换函数运算后异或随机数以打乱其汉明重量,改变CP-kernel的校验性质,阻止攻击者利用中间相遇的方法寻找原象,提高了 SHA-3 算法的抗原象攻击能力;最后利用VHDL硬件语言实现抗原象攻击SHA-
LIJianrui(李建瑞)   +2 more
doaj   +1 more source

Authentication protocols on restricted devices [PDF]

open access: yes, 2014
Tato práce se zabývá obecně autentizačními metodami, speciálně autentizací pomocí znalosti. Následně jsou stručně popsány MD hash funkce, SHA hash funkce, Keccak, Blake, Grostl, JH, Skein a uvedeno jejich srovnání na nízkovýkonových mikrokontrolérech. Do
Šebesta, David
core  

Hardware authentication based on PUFs and SHA-3 2nd round candidates [PDF]

open access: yes, 2010
Security features are getting a growing interest in microelectronics. Not only entities have to authenticate in the context of a high secure communication but also the hardware employed has to be trusted.
Baturone Castillo, María Iluminada   +1 more
core   +1 more source

MedBlockSure: Blockchain‐based insurance system

open access: yesCognitive Computation and Systems, Volume 6, Issue 4, Page 98-107, December 2024.
Abstract Health insurance plays a vital role during medical emergencies in the coverage against medical expenses. Insurance fraud is an international challenge that affects most economies worldwide. Government and private companies offer many insurance schemes.
Charu Krishna   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy