Results 51 to 60 of about 4,088 (185)

On quantum preimage attacks

open access: yes, 2014
We propose a preimage attack against cryptographic hash functions based on the speedup enabled by quantum computing. Preimage resistance is a fundamental property cryptographic hash functions must possess. The motivation behind this work relies in the lack of conventional attacks against newly introduced hash schemes such as the recently elected SHA-3 ...
openaire   +3 more sources

Enhancing Medical Images Security and Efficiency With Adaptive Compressed Sensing and SHA‐3 in Telemedicine

open access: yesInternational Journal of Biomedical Imaging, Volume 2025, Issue 1, 2025.
Security issues of telemedicine‐based secure transmission of medical images find a very thin line drawn between diagnostic acceptability and cybersecurity. Partial but imperfect solutions emerge. JPEG2000 and HEVC concentrate only on compression, failing to provide any security consideration.
Ashraf Al Sharah   +7 more
wiley   +1 more source

Integrity verification for digital Holy Quran verses using cryptographic hash function and compression

open access: yesJournal of King Saud University: Computer and Information Sciences, 2020
Data Integrity is one of the primary concepts in information security. The main task of the cryptographic hash function is to assure the integrity of the transmitted data.
Mishal Almazrooie   +5 more
doaj   +1 more source

A second preimage attack on zipper hash

open access: yesSecurity and Communication Networks, 2015
AbstractThe zipper hash utilizes two‐pass hashing to strengthen the iterated hash functions against the generic attack. In this paper, we analyze the features of zipper hash and several existing generic attacks on hash functions. A new tree structure called inverse‐diamond, which starts from one fixed point and ends with many points, is exploited to ...
Shiwei Chen, Chenhui Jin
openaire   +1 more source

ArtProtect: Blockchain and NFC‐based anti‐counterfeit system for physical art

open access: yesIET Blockchain, Volume 4, Issue 4, Page 423-442, December 2024.
An anti‐counterfeiting system for physical art based on Ethereum blockchain and near‐field communication technology is proposed and implemented. The system leverages the use of Ethereum smart contracts and inter‐planetary file system to store artworks’ certificate of authenticity, and display them in a mobile app called ArtProtect.
Cindy Handoko Tantowibowo   +1 more
wiley   +1 more source

Characterizing the Shape of Activation Space in Deep Neural Networks

open access: yes, 2019
The representations learned by deep neural networks are difficult to interpret in part due to their large parameter space and the complexities introduced by their multi-layer structure.
Gebhart, Thomas   +2 more
core   +1 more source

Systematic review: Comparing zk‐SNARK, zk‐STARK, and bulletproof protocols for privacy‐preserving authentication

open access: yesSECURITY AND PRIVACY, Volume 7, Issue 5, September/October 2024.
Abstract This systematic literature review examines the implementation and analysis of zk‐SNARK, zk‐STARK, and bulletproof non‐interactive zero‐knowledge proof (NIZKP) protocols in privacy‐preserving applications across diverse sectors. Examining 41 research works obtained through the systematic search queries and filtering criteria published from 2015
Bjorn Oude Roelink   +2 more
wiley   +1 more source

Provable security signcryption scheme based on RLWE without trapdoor

open access: yesTongxin xuebao, 2020
In view of the existing efficiency and security problems of lattice based signcryption,with the ABB16’s signature scheme ring-TESLA,a signcryption scheme without trapdoor named RLWE-SC was constructed,which achieved indistinguish ability against adaptive
Zhen LIU   +3 more
doaj   +2 more sources

Badly approximable grids and k$k$‐divergent lattices

open access: yesMathematika, Volume 70, Issue 3, July 2024.
Abstract Let A∈Matm×n(R)$A\in \operatorname{Mat}_{m\times n}(\mathbb {R})$ be a matrix. In this paper, we investigate the set BadA⊂Tm$\operatorname{Bad}_A\subset \mathbb {T}^m$ of badly approximable targets for A$A$, where Tm$\mathbb {T}^m$ is the m$m$‐torus. It is well known that BadA$\operatorname{Bad}_A$ is a winning set for Schmidt's game and hence
Nikolay Moshchevitin   +2 more
wiley   +1 more source

Preimage Attacks on Reduced Tiger and SHA-2 [PDF]

open access: yes, 2009
This paper shows new preimage attacks on reduced Tiger and SHA-2. Indesteege and Preneel presented a preimage attack on Tiger reduced to 13 rounds (out of 24) with a complexity of 2128.5. Our new preimage attack finds a one-block preimage of Tiger reduced to 16 rounds with a complexity of 2161. The proposed attack is based on meet-in-the-middle attacks.
Takanori Isobe, Kyoji Shibutani
openaire   +1 more source

Home - About - Disclaimer - Privacy