A chaotic parallel hash engine with dynamic stochastic diffusion for blockchain and cloud security. [PDF]
Wang Q +5 more
europepmc +1 more source
Post-quantum security of hash functions
The research covered in this thesis is dedicated to provable post-quantum security of hash functions. Post-quantum security provides security guarantees against quantum attackers. We focus on analyzing the sponge construction, a cryptographic construction used in the standardized hash function SHA3.Our main results are proving a number of quantum ...
openaire +1 more source
The Untapped Potential of Ascon Hash Functions: Benchmarking, Hardware Profiling, and Application Insights for Secure IoT and Blockchain Systems. [PDF]
Gladis Kurian M, Chen Y.
europepmc +1 more source
Quantum resistant blockchain and deep learning revolutionize secure communications for autonomous vehicles. [PDF]
Alluhaibi R.
europepmc +1 more source
Data security storage and transmission framework for AI computing power platforms. [PDF]
Chen J +5 more
europepmc +1 more source
Secure and fault tolerant cloud based framework for medical image storage and retrieval in a distributed environment. [PDF]
Amaithi Rajan A, V V, M A, R PK.
europepmc +1 more source
A custom hash algorithm for hosting secure gray scale image repository in public cloud. [PDF]
Murugesan V +2 more
europepmc +1 more source
Hybrid cryptographic approach for strengthening IoT and 5G/B5G network security. [PDF]
Kumar A, Singh P, Kamble DP, Singh I.
europepmc +1 more source
Computing quantum hashing in the model of quantum branching programs
F. Ablayev, M. Ablayev, A. Vasiliev
semanticscholar +1 more source
Post-Quantum enhanced Ascon for secure vehicular IoT data integrity. [PDF]
A J B, P K, R K, R M.
europepmc +1 more source

