Results 111 to 120 of about 12,815 (252)
The development of mobile applications is unbalanced with the level of its security which is vulnerable to hacker attacks. Some important things that need to be considered in the security of mobile applications are login and database system.
Hamdan Dian Jaya Rozi Hyang Utami+2 more
doaj +1 more source
There are numerous schemes to generically signature artifacts. We specifically consider how to circumvent signatures based on imphash. Imphash is used to signature Portable Executable (PE) files and an imphash of a PE file is an MD5 digest over all the symbols that PE file imports.
arxiv
ANALYSIS OF CRYPTOGRAPHIC STRENGTH OF THE MODIFIED MD5 ALGORITHM [PDF]
Valentin Telegin
openalex +1 more source
Design and evaluation of chaotic iterations based keyed hash function [PDF]
Investigating how to construct a secure hash algorithm needs in-depth study, as various existing hash functions like the MD5 algorithm have recently exposed their security flaws. At the same time, hash function based on chaotic theory has become an emerging research in the field of nonlinear information security.
arxiv
Deep Learning Based Cryptographic Primitive Classification [PDF]
Cryptovirological augmentations present an immediate, incomparable threat. Over the last decade, the substantial proliferation of crypto-ransomware has had widespread consequences for consumers and organisations alike. Established preventive measures perform well, however, the problem has not ceased.
arxiv
Using fuzzy bits and neural networks to partially invert few rounds of some cryptographic hash functions [PDF]
We consider fuzzy, or continuous, bits, which take values in [0;1] and (-1;1] instead of {0;1}, and operations on them (NOT, XOR etc.) and on their sequences (ADD), to obtain the generalization of cryptographic hash functions, CHFs, for the messages consisting of fuzzy bits, so that CHFs become smooth and non-constant functions of each bit of the ...
arxiv
E-voting Is the use of hardware and software to establish an electronic system that is useful in the electoral process by making electronic votes that replace ballot papers.
Muhadi M.Ilyas Gultom, Darjat Saripurna
semanticscholar +1 more source
Learning tool for IPSEC with emphasis on the use of MGRE in corporate networks
This paper presents a tool named “UV IPsec Tools”, developed to understand and interact in a didactic way with the transformations performed by IPsec when using the MD5, SHA-1 and 3DES algorithms for the encryption and integrity check of an IPv4 datagram.
Andrés Mauricio Ramírez+2 more
doaj
Encoding Cryptographic Functions to SAT Using Transalg System [PDF]
In this paper we propose the technology for constructing propositional encodings of discrete functions. It is aimed at solving inversion problems of considered functions using state-of-the-art SAT solvers. We implemented this technology in the form of the software system called Transalg, and used it to construct SAT encodings for a number of ...
arxiv
Collision and Preimage Resistance of the Centera Content Address [PDF]
Centera uses cryptographic hash functions as a means of addressing stored objects, thus creating a new class of data storage referred to as CAS (content addressed storage). Such hashing serves the useful function of providing a means of uniquely identifying data and providing a global handle to that data, referred to as the Content Address or CA ...
arxiv