Results 11 to 20 of about 311,948 (105)
Power Efficiency in Unfolding RIPEMD-160: Dynamic Power Analysis Using Gray Encoding in FPGA Design
The RIPEMD-160 hash functions are extensively used in many cryptographic applications, including digital signatures, Hash Message Authentication Codes (HMAC) and others. Unfolding RIPEMD-160 was designed to analyse the architecture of the design in terms
Shamsiah Suhaili +3 more
semanticscholar +3 more sources
Advancements in communication and storage technologies need robust encryption tools to protect data. Cryptographic hash functions are crucial in maintaining data integrity and security by turning variable-length inputs into fixed-size digests. RIPEMD-160
Suparn Padma Patra, Mamta Rani
semanticscholar +3 more sources
Improved Preimage Attacks on RIPEMD-160 and HAS-160 [PDF]
Yanzhao Shen, Gaoli Wang
semanticscholar +3 more sources
Multiple Securities for Cloud Computing Using RIPEMD-160
Cloud facing many new security threats day by day the threats are vulnerable and reduces the confidentiality of the cloud secure cloud from these various attacks, here a multiple security aspect is proposed to make the cloud more secure. There are dozens of security has been reported till now, in that in this paper it is tried to secure the cloud from ...
S. Kshipra Prasadh, S. Sivasubramanian
semanticscholar +3 more sources
Authentication with RIPEMD-160 and Other Alternatives: A Hardware Design Perspective [PDF]
Taking into consideration the rapid evolution of communication standards that include message authentication and integrity verification, it is realized that constructions like MAC and HMAC, are widely used in the most popular cryptographic schemes since ...
Harris E. Michail +5 more
semanticscholar +6 more sources
Complexity Analysis of Distinguishing Attack on 51-step RIPEMD-160 [PDF]
SASAKI Y,et al used message modification technology to differentiate attack on 51-step RIPEMD-160(Lecture Notes in Computer Science,Vol.7341),but they did not consider the influence of modular subtraction difference on differential routes,and could not ...
CUI Binbin, WANG Gaoli
doaj +3 more sources
Throughput Enhancement of the RIPEMD-160 Design Using the Unfolding Transformation Technique [PDF]
: Many cryptographic applications use RIPEMD-160 hash functions, such as digital signatures, Hash Message Authentication Code (HMAC), and other data security applications.
Norhuzaimin, Julai +2 more
core +3 more sources
A fingerprint encryption scheme based on irreversible function and secure authentication. [PDF]
A fingerprint encryption scheme based on irreversible function has been designed in this paper. Since the fingerprint template includes almost the entire information of users’ fingerprints, the personal authentication can be determined only by the fingerprint features.
Yang Y, Yu J, Zhang P, Wang S.
europepmc +2 more sources
The Use of HMAC-RIPEMD-160-96 within ESP and AH [PDF]
Angelos D. Keromytis, Niels Provos
semanticscholar +3 more sources
Efficient Pipelined Hardware Implementation Of Ripemd-160 Hash Function
{"references": ["RFC 2510 - Internet X.509 PKI - Certificate Management Protocols,\navailable at www.ietf.org/rfc/rfc2510.txt", "SP800-77 , Guide to IPSec VPN-s, National Institute of Standards and\nTechnology (NIST).", "Secure Electronic Transactions: An Overview, available at\nwww.davidreilly.com/topics/electronic_commerce/essays/secure_electro ...
Harris E. Michail +4 more
openalex +2 more sources

