Results 81 to 90 of about 3,739 (238)

Optimization of Tree Modes for Parallel Hash Functions: A Case Study [PDF]

open access: yes, 2017
This paper focuses on parallel hash functions based on tree modes of operation for an inner Variable-Input-Length function. This inner function can be either a single-block-length (SBL) and prefix-free MD hash function, or a sponge-based hash function ...
Atighehchi, Kevin, Rolland, Robert
core   +1 more source

Unaligned Rebound Attack: Application to Keccak [PDF]

open access: yes, 2012
We analyze the internal permutations of Keccak, one of the NIST SHA-3 competition finalists, in regard to differential properties. By carefully studying the elements composing those permutations, we are able to derive most of the best known differential paths for up to 5 rounds. We use these differential paths in a rebound attack setting and adapt this
Alexandre Duc   +3 more
openaire   +1 more source

Bilevel access control and constraint‐aware response provisioning in edge‐enabled software defined network‐internet of things network using the safeguard authentication dynamic access control model

open access: yesInternational Journal of Communication Systems, Volume 37, Issue 18, December 2024.
A centralized controller vulnerable to attacks is one of the security vulnerabilities and scalability issues faced by the Internet of Things (IoT)‐connected software‐defined network (SDN). Safeguard Authentication Dynamic Access Control (SANDMAC) tackles these issues by emphasizing secure access control and user and application authentication ...
Sahana D S, Brahmananda S H
wiley   +1 more source

Authentication protocols on restricted devices [PDF]

open access: yes, 2014
Tato práce se zabývá obecně autentizačními metodami, speciálně autentizací pomocí znalosti. Následně jsou stručně popsány MD hash funkce, SHA hash funkce, Keccak, Blake, Grostl, JH, Skein a uvedeno jejich srovnání na nízkovýkonových mikrokontrolérech. Do
Šebesta, David
core  

An on‐chain trading model of real world asset backed digital assets

open access: yesIET Blockchain, Volume 4, Issue 4, Page 315-323, December 2024.
To bridge this gap between off‐chain and on‐chain economic systems, an on‐chain trading model was developed by leveraging key techniques, including HD key derivation, tokenization, oracle, DEX, parallel transactions based on DAG model. Abstract Metaverse is a digital value interaction network based on blockchain technology, with an important economic ...
Dongsheng Hou   +5 more
wiley   +1 more source

セキュアRFIDタグチップの設計論 [PDF]

open access: yes, 2017
In this thesis, we focus on radio frequency identification (RFID) tag. We design, implement, and evaluate hardware performance of a secure tag that runs the authentication protocol based on cryptographic algorithms.
Shugo Mikami, 三上 修吾
core   +2 more sources

An efficient secure predictive demand forecasting system using Ethereum virtual machine

open access: yesIET Blockchain, Volume 4, Issue S1, Page 526-542, December 2024.
The article is about predictive analysis on Ethereum virtual machine. Abstract Predictive demand forecasting plays a pivotal role in optimizing supply chain management, enabling businesses to effectively allocate resources and minimize operational inefficiencies.
Himani Saraswat   +2 more
wiley   +1 more source

Optimization of preimage resistance on SHA-3 algorithm(SHA-3算法的抗原象攻击性能优化)

open access: yesZhejiang Daxue xuebao. Lixue ban, 2016
通过对SHA-3算法置换函数Keccak-f的线性性质以及缩减轮数的Keccak杂凑函数原象攻击的研究,提出了 SHA-3算法的抗原象攻击性能优化设计方案.首先结合Keccak杂凑函数的差分特点和θ置换函数的奇偶性质,分析了基于CP-kernel的SHA-3算法原象攻击;然后针对目前实施原象攻击的方法,在θ置换函数运算后异或随机数以打乱其汉明重量,改变CP-kernel的校验性质,阻止攻击者利用中间相遇的方法寻找原象,提高了 SHA-3 算法的抗原象攻击能力;最后利用VHDL硬件语言实现抗原象攻击SHA-
LIJianrui(李建瑞)   +2 more
doaj   +1 more source

Side-channel analysis of MAC-Keccak hardware implementations [PDF]

open access: yesProceedings of the Fourth Workshop on Hardware and Architectural Support for Security and Privacy, 2015
As Keccak has been selected as the new SHA-3 standard, Message Authentication Code (MAC) (MAC-Keccak) using a secret key will be widely used for integrity checking and authenticity assurance. Recent works have shown the feasibility of side-channel attacks against software implementations of MAC-Keccak to retrieve the key, with the security assessment ...
Pei Luo   +5 more
openaire   +1 more source

ArtProtect: Blockchain and NFC‐based anti‐counterfeit system for physical art

open access: yesIET Blockchain, Volume 4, Issue 4, Page 423-442, December 2024.
An anti‐counterfeiting system for physical art based on Ethereum blockchain and near‐field communication technology is proposed and implemented. The system leverages the use of Ethereum smart contracts and inter‐planetary file system to store artworks’ certificate of authenticity, and display them in a mobile app called ArtProtect.
Cindy Handoko Tantowibowo   +1 more
wiley   +1 more source

Home - About - Disclaimer - Privacy