Results 111 to 120 of about 12,815 (252)

Security Login System on Mobile Application with Implementation of Advanced Encryption Standard (AES) using 3 Keys Variation 128-bit, 192-bit, and 256-bit

open access: yesScientific Journal of Informatics, 2019
The development of mobile applications is unbalanced with the level of its security which is vulnerable to hacker attacks. Some important things that need to be considered in the security of mobile applications are login and database system.
Hamdan Dian Jaya Rozi Hyang Utami   +2 more
doaj   +1 more source

Breaking Imphash [PDF]

open access: yesarXiv, 2019
There are numerous schemes to generically signature artifacts. We specifically consider how to circumvent signatures based on imphash. Imphash is used to signature Portable Executable (PE) files and an imphash of a PE file is an MD5 digest over all the symbols that PE file imports.
arxiv  

Design and evaluation of chaotic iterations based keyed hash function [PDF]

open access: yesarXiv, 2017
Investigating how to construct a secure hash algorithm needs in-depth study, as various existing hash functions like the MD5 algorithm have recently exposed their security flaws. At the same time, hash function based on chaotic theory has become an emerging research in the field of nonlinear information security.
arxiv  

Deep Learning Based Cryptographic Primitive Classification [PDF]

open access: yesarXiv, 2017
Cryptovirological augmentations present an immediate, incomparable threat. Over the last decade, the substantial proliferation of crypto-ransomware has had widespread consequences for consumers and organisations alike. Established preventive measures perform well, however, the problem has not ceased.
arxiv  

Using fuzzy bits and neural networks to partially invert few rounds of some cryptographic hash functions [PDF]

open access: yesarXiv, 2019
We consider fuzzy, or continuous, bits, which take values in [0;1] and (-1;1] instead of {0;1}, and operations on them (NOT, XOR etc.) and on their sequences (ADD), to obtain the generalization of cryptographic hash functions, CHFs, for the messages consisting of fuzzy bits, so that CHFs become smooth and non-constant functions of each bit of the ...
arxiv  

Perancangan Sistem Keamanan Aplikasi E-Voting Untuk Pemilihan Ketua Badan Eksekutif Mahasiswa Fakultas Teknik UISU Dengan Menggunakan Algoritma MD5

open access: yes, 2019
E-voting Is the use of hardware and software to establish an electronic system that is useful in the electoral process by making electronic votes that replace ballot papers.
Muhadi M.Ilyas Gultom, Darjat Saripurna
semanticscholar   +1 more source

Learning tool for IPSEC with emphasis on the use of MGRE in corporate networks

open access: yesRevista UIS Ingenierías, 2013
This paper presents a tool named “UV IPsec Tools”, developed to understand and interact in a didactic way with the transformations performed by IPsec when using the MD5, SHA-1 and 3DES algorithms for the encryption and integrity check of an IPv4 datagram.
Andrés Mauricio Ramírez   +2 more
doaj  

Encoding Cryptographic Functions to SAT Using Transalg System [PDF]

open access: yesarXiv, 2016
In this paper we propose the technology for constructing propositional encodings of discrete functions. It is aimed at solving inversion problems of considered functions using state-of-the-art SAT solvers. We implemented this technology in the form of the software system called Transalg, and used it to construct SAT encodings for a number of ...
arxiv  

Collision and Preimage Resistance of the Centera Content Address [PDF]

open access: yesarXiv, 2013
Centera uses cryptographic hash functions as a means of addressing stored objects, thus creating a new class of data storage referred to as CAS (content addressed storage). Such hashing serves the useful function of providing a means of uniquely identifying data and providing a global handle to that data, referred to as the Content Address or CA ...
arxiv  

Home - About - Disclaimer - Privacy