Results 71 to 80 of about 164,602 (198)

Design and implementation of an ASIP-based cryptography processor for AES, IDEA, and MD5

open access: yesEngineering Science and Technology, an International Journal, 2017
In this paper, a new 32-bit ASIP-based crypto processor for AES, IDEA, and MD5 is designed. The instruction-set consists of both general purpose and specific instructions for the above cryptographic algorithms. The proposed architecture has nine function
Karim Shahbazi   +2 more
doaj   +1 more source

A Formula That Generates Hash Collisions

open access: yes, 2018
We present an explicit formula that produces hash collisions for the Merkle-Damg{\aa}rd construction. The formula works for arbitrary choice of message block and irrespective of the standardized constants used in hash functions, although some padding ...
Brockmann, Andrew
core  

Secure Directories [PDF]

open access: yes, 2000
This paper describes the mechanisms that are needed in order to provide a secure directory service based on the X.500 data model. A brief introduction to the X.500 data model is given followed by an overview of the Lightweight Directory Access Protocol ...
Chadwick, David W.
core  

Flexible Session Management in a Distributed Environment

open access: yes, 2010
Many secure communication libraries used by distributed systems, such as SSL, TLS, and Kerberos, fail to make a clear distinction between the authentication, session, and communication layers.
  +17 more
core   +2 more sources

An optimistic fair e-commerce protocol for large e-goods [PDF]

open access: yes, 2006
Suppose two entities that do not trust each other want to exchange some arbitrary data over a public channel. A fair exchange protocol ensures that both parties get what they want or neither gets anything.
Levi, Albert   +4 more
core  

BLAKE2: Simpler, Smaller, Fast as MD5 [PDF]

open access: yes, 2013
We present the hash function BLAKE2, an improved version of the SHA-3 finalist BLAKE optimized for speed in software. Target applications include cloud storage, intrusion detection, or version control systems. BLAKE2 comes in two main flavors: BLAKE2b is optimized for 64-bit platforms, and BLAKE2s for smaller architectures.
Zooko Wilcox-O'Hearn   +3 more
openaire   +2 more sources

Evaluation of the proximate composition, functional, and pasting properties of ichipipi maize flour

open access: yesApplied Food Research
Ichipipi food is a traditional meal in Tanzania's southern highlands. In this study, ichipipi composite flour (MD) was produced using maize harvested at two different stages: milk (M) and dough (D) mixed at various ratios. Then, the proximate composition,
Princess Mpili   +2 more
doaj   +1 more source

Security Login System on Mobile Application with Implementation of Advanced Encryption Standard (AES) using 3 Keys Variation 128-bit, 192-bit, and 256-bit

open access: yesScientific Journal of Informatics, 2019
The development of mobile applications is unbalanced with the level of its security which is vulnerable to hacker attacks. Some important things that need to be considered in the security of mobile applications are login and database system.
Hamdan Dian Jaya Rozi Hyang Utami   +2 more
doaj   +1 more source

Applying Lessons from Cyber Attacks on Ukrainian Infrastructures to Secure Gateways onto the Industrial Internet of Things [PDF]

open access: yes, 2017
Previous generations of safety-related industrial control systems were ‘air gapped’. In other words, process control components including Programmable Logic Controllers (PLCs) and smart sensor/actuators were disconnected and isolated from local or wide
Evangelopoulou, Maria   +2 more
core  

SIMULASI KUNCI ELEKTRONIK DENGAN ENKRIPSI MELALUI BLUETOOTH PADA PONSEL

open access: yesCommIT Journal, 2008
Currently the facility provided by mobile phones is very diverse. Starting from the phone, SMS, camera, music player, all rolled into one. Obviously the phone can also be used as electronic keys to replace the existing analog key at this time.
Indri Neforawati, Hoga Saragih
doaj   +1 more source

Home - About - Disclaimer - Privacy