Results 81 to 90 of about 2,808 (186)

Implementación hardware del algoritmo Keccak para Hash-3 y comparación con Blake, Grøstl, JH y Skein

open access: yesInformador Técnico, 2013
Las funciones criptográficas Hash convierten un mensaje de longitud variable en un “resumen del mensaje”, y son usadas para aplicaciones de firma digital, códigos de autenticación de mensajes y otras aplicaciones para seguridad informática.
Melissa Ramírez   +3 more
doaj   +1 more source

Fault Attacks Resistant Architecture for KECCAK Hash Function [PDF]

open access: yesInternational Journal of Advanced Computer Science and Applications, 2017
Les algorithmes cryptographiques KECCAK largement utilisés dans les circuits intégrés pour assurer un niveau élevé de sécurité à tous les systèmes qui nécessitent un hachage comme la vérification de l'intégrité et la génération de nombres aléatoires.
Fatma Kahri   +3 more
openaire   +1 more source

セキュアRFIDタグチップの設計論 [PDF]

open access: yes, 2017
In this thesis, we focus on radio frequency identification (RFID) tag. We design, implement, and evaluate hardware performance of a secure tag that runs the authentication protocol based on cryptographic algorithms.
Shugo Mikami, 三上 修吾
core   +2 more sources

A Semantic Framework for the Security Analysis of Ethereum smart contracts

open access: yes, 2018
Smart contracts are programs running on cryptocurrency (e.g., Ethereum) blockchains, whose popularity stem from the possibility to perform financial transactions, such as payments and auctions, in a distributed environment without need for any trusted ...
A Biryukov   +6 more
core   +2 more sources

Kulla‐RIV: A composing model with integrity verification for efficient and reliable data processing services

open access: yesSoftware: Practice and Experience, Volume 54, Issue 8, Page 1516-1542, August 2024.
Abstract This article presents the design and implementation of a reliable computing virtual container‐based model with integrity verification for data processing strategies named the reliability and integrity verification (RIV) scheme. It has been integrated into a system construction model as well as existing workflow engines (e.g., Kulla and ...
Hugo G. Reyes‐Anastacio   +4 more
wiley   +1 more source

Grayscale Image Authentication using Neural Hashing

open access: yes, 2016
Many different approaches for neural network based hash functions have been proposed. Statistical analysis must correlate security of them. This paper proposes novel neural hashing approach for gray scale image authentication.
Kutlu, Yakup, Yayık, Apdullah
core   +2 more sources

Toward designing a lightweight RFID authentication protocol for constrained environments

open access: yesIET Communications, Volume 18, Issue 14, Page 846-859, August 2024.
Our article investigates the vulnerabilities of lightweight RFID authentication schemes, namely LRSAS+ and LRARP+, and proposes an enhanced version leveraging the χper$\chi per$ function to address their weaknesses. Through formal analysis and comparison with contemporary systems, we demonstrate that the improved scheme achieves robust security while ...
Nasser Zarbi   +3 more
wiley   +1 more source

Higher-Order Side-Channel Protected Implementations of KECCAK

open access: yes2017 Euromicro Conference on Digital System Design (DSD), 2017
The efficient protection of security critical devices against side-channel analysis attacks is a fundamental need in the age of Internet of Things and ubiquitous computing. In this work, we introduce a configurable hardware design of KECCAK (SHA-3) which can be tailored to fulfill the needs of a wide range of different applications.
Gross, Hannes   +2 more
openaire   +2 more sources

Implementation of cryptographic primitives [PDF]

open access: yes, 2015
Tato semestrální práce je zaměřena na kryptografické metody. Část se věnuje blokovým šifrám, kde popisuje algoritmy Blowfish a 3DES. Dále se zabývá hashovacími funkcemi, z nich podrobně rozebírá algoritmy SHA-3 a Tiger.This semestral thesis is focused on
Jégrová, Eliška
core  

Efficient implementation of a CCA2-secure variant of McEliece using generalized Srivastava codes [PDF]

open access: yes, 2012
International audienceIn this paper we present efficient implementations of McEliece variants using quasi-dyadic codes. We provide secure parameters for a classical McEliece encryption scheme based on quasi-dyadic generalized Srivastava codes, and ...
B. Biswas   +20 more
core   +3 more sources

Home - About - Disclaimer - Privacy