Results 51 to 60 of about 4,088 (185)
We propose a preimage attack against cryptographic hash functions based on the speedup enabled by quantum computing. Preimage resistance is a fundamental property cryptographic hash functions must possess. The motivation behind this work relies in the lack of conventional attacks against newly introduced hash schemes such as the recently elected SHA-3 ...
openaire +3 more sources
Security issues of telemedicine‐based secure transmission of medical images find a very thin line drawn between diagnostic acceptability and cybersecurity. Partial but imperfect solutions emerge. JPEG2000 and HEVC concentrate only on compression, failing to provide any security consideration.
Ashraf Al Sharah +7 more
wiley +1 more source
Data Integrity is one of the primary concepts in information security. The main task of the cryptographic hash function is to assure the integrity of the transmitted data.
Mishal Almazrooie +5 more
doaj +1 more source
A second preimage attack on zipper hash
AbstractThe zipper hash utilizes two‐pass hashing to strengthen the iterated hash functions against the generic attack. In this paper, we analyze the features of zipper hash and several existing generic attacks on hash functions. A new tree structure called inverse‐diamond, which starts from one fixed point and ends with many points, is exploited to ...
Shiwei Chen, Chenhui Jin
openaire +1 more source
ArtProtect: Blockchain and NFC‐based anti‐counterfeit system for physical art
An anti‐counterfeiting system for physical art based on Ethereum blockchain and near‐field communication technology is proposed and implemented. The system leverages the use of Ethereum smart contracts and inter‐planetary file system to store artworks’ certificate of authenticity, and display them in a mobile app called ArtProtect.
Cindy Handoko Tantowibowo +1 more
wiley +1 more source
Characterizing the Shape of Activation Space in Deep Neural Networks
The representations learned by deep neural networks are difficult to interpret in part due to their large parameter space and the complexities introduced by their multi-layer structure.
Gebhart, Thomas +2 more
core +1 more source
Abstract This systematic literature review examines the implementation and analysis of zk‐SNARK, zk‐STARK, and bulletproof non‐interactive zero‐knowledge proof (NIZKP) protocols in privacy‐preserving applications across diverse sectors. Examining 41 research works obtained through the systematic search queries and filtering criteria published from 2015
Bjorn Oude Roelink +2 more
wiley +1 more source
Provable security signcryption scheme based on RLWE without trapdoor
In view of the existing efficiency and security problems of lattice based signcryption,with the ABB16’s signature scheme ring-TESLA,a signcryption scheme without trapdoor named RLWE-SC was constructed,which achieved indistinguish ability against adaptive
Zhen LIU +3 more
doaj +2 more sources
Badly approximable grids and k$k$‐divergent lattices
Abstract Let A∈Matm×n(R)$A\in \operatorname{Mat}_{m\times n}(\mathbb {R})$ be a matrix. In this paper, we investigate the set BadA⊂Tm$\operatorname{Bad}_A\subset \mathbb {T}^m$ of badly approximable targets for A$A$, where Tm$\mathbb {T}^m$ is the m$m$‐torus. It is well known that BadA$\operatorname{Bad}_A$ is a winning set for Schmidt's game and hence
Nikolay Moshchevitin +2 more
wiley +1 more source
Preimage Attacks on Reduced Tiger and SHA-2 [PDF]
This paper shows new preimage attacks on reduced Tiger and SHA-2. Indesteege and Preneel presented a preimage attack on Tiger reduced to 13 rounds (out of 24) with a complexity of 2128.5. Our new preimage attack finds a one-block preimage of Tiger reduced to 16 rounds with a complexity of 2161. The proposed attack is based on meet-in-the-middle attacks.
Takanori Isobe, Kyoji Shibutani
openaire +1 more source

