Results 81 to 90 of about 3,739 (238)
Optimization of Tree Modes for Parallel Hash Functions: A Case Study [PDF]
This paper focuses on parallel hash functions based on tree modes of operation for an inner Variable-Input-Length function. This inner function can be either a single-block-length (SBL) and prefix-free MD hash function, or a sponge-based hash function ...
Atighehchi, Kevin, Rolland, Robert
core +1 more source
Unaligned Rebound Attack: Application to Keccak [PDF]
We analyze the internal permutations of Keccak, one of the NIST SHA-3 competition finalists, in regard to differential properties. By carefully studying the elements composing those permutations, we are able to derive most of the best known differential paths for up to 5 rounds. We use these differential paths in a rebound attack setting and adapt this
Alexandre Duc +3 more
openaire +1 more source
A centralized controller vulnerable to attacks is one of the security vulnerabilities and scalability issues faced by the Internet of Things (IoT)‐connected software‐defined network (SDN). Safeguard Authentication Dynamic Access Control (SANDMAC) tackles these issues by emphasizing secure access control and user and application authentication ...
Sahana D S, Brahmananda S H
wiley +1 more source
Authentication protocols on restricted devices [PDF]
Tato práce se zabývá obecně autentizačními metodami, speciálně autentizací pomocí znalosti. Následně jsou stručně popsány MD hash funkce, SHA hash funkce, Keccak, Blake, Grostl, JH, Skein a uvedeno jejich srovnání na nízkovýkonových mikrokontrolérech. Do
Šebesta, David
core
An on‐chain trading model of real world asset backed digital assets
To bridge this gap between off‐chain and on‐chain economic systems, an on‐chain trading model was developed by leveraging key techniques, including HD key derivation, tokenization, oracle, DEX, parallel transactions based on DAG model. Abstract Metaverse is a digital value interaction network based on blockchain technology, with an important economic ...
Dongsheng Hou +5 more
wiley +1 more source
In this thesis, we focus on radio frequency identification (RFID) tag. We design, implement, and evaluate hardware performance of a secure tag that runs the authentication protocol based on cryptographic algorithms.
Shugo Mikami, 三上 修吾
core +2 more sources
An efficient secure predictive demand forecasting system using Ethereum virtual machine
The article is about predictive analysis on Ethereum virtual machine. Abstract Predictive demand forecasting plays a pivotal role in optimizing supply chain management, enabling businesses to effectively allocate resources and minimize operational inefficiencies.
Himani Saraswat +2 more
wiley +1 more source
Optimization of preimage resistance on SHA-3 algorithm(SHA-3算法的抗原象攻击性能优化)
通过对SHA-3算法置换函数Keccak-f的线性性质以及缩减轮数的Keccak杂凑函数原象攻击的研究,提出了 SHA-3算法的抗原象攻击性能优化设计方案.首先结合Keccak杂凑函数的差分特点和θ置换函数的奇偶性质,分析了基于CP-kernel的SHA-3算法原象攻击;然后针对目前实施原象攻击的方法,在θ置换函数运算后异或随机数以打乱其汉明重量,改变CP-kernel的校验性质,阻止攻击者利用中间相遇的方法寻找原象,提高了 SHA-3 算法的抗原象攻击能力;最后利用VHDL硬件语言实现抗原象攻击SHA-
LIJianrui(李建瑞) +2 more
doaj +1 more source
Side-channel analysis of MAC-Keccak hardware implementations [PDF]
As Keccak has been selected as the new SHA-3 standard, Message Authentication Code (MAC) (MAC-Keccak) using a secret key will be widely used for integrity checking and authenticity assurance. Recent works have shown the feasibility of side-channel attacks against software implementations of MAC-Keccak to retrieve the key, with the security assessment ...
Pei Luo +5 more
openaire +1 more source
ArtProtect: Blockchain and NFC‐based anti‐counterfeit system for physical art
An anti‐counterfeiting system for physical art based on Ethereum blockchain and near‐field communication technology is proposed and implemented. The system leverages the use of Ethereum smart contracts and inter‐planetary file system to store artworks’ certificate of authenticity, and display them in a mobile app called ArtProtect.
Cindy Handoko Tantowibowo +1 more
wiley +1 more source

