Results 11 to 20 of about 750 (85)

A unified architecture of MD5 and RIPEMD-160 hash algorithms [PDF]

open access: yes2004 IEEE International Symposium on Circuits and Systems (IEEE Cat. No.04CH37512), 2004
Hash algorithms are important components in many cryptographic applications and security protocol suites. In this paper, a unified architecture for MD5 and RIPEMD-160 hash algorithms is developed.
Ng, CW, Ng, TS, Yip, KW
core   +2 more sources

RIPEMD-160: A strengthened version of RIPEMD [PDF]

open access: yesInternational Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II, 1996
Cryptographic hash functions are an important tool in cryptography for applications such as digital fingerprinting of messages, message authentication, and key derivation. During the last five years, several fast software hash functions have been proposed; most of them are based on the design principles of Ron Rivest's MD4. One such proposal was RIPEMD,
Dobbertin, Hans   +2 more
  +12 more sources

Differential Attacks on Reduced RIPEMD-160 [PDF]

open access: yesDesigns, Codes and Cryptography, 2012
In this work, we provide the first security analysis of reduced RIPEMD-160 regarding its collision resistance with practical complexity. The ISO/IEC standard RIPEMD-160 was proposed 15 years ago and may be used as a drop-in replacement for SHA-1 due to their same hash output length.
Mendel, Florian   +3 more
  +8 more sources

Analysis of RIPEMD-160: New Collision Attacks and Finding Characteristics with MILP [PDF]

open access: yes, 2023
The hash function RIPEMD-160 is an ISO/IEC standard and is being used to generate the bitcoin address together with SHA-256. Despite the fact that many hash functions in the MD-SHA hash family have been broken, RIPEMD-160 remains secure and the best ...
Fukang Liu   +6 more
core   +2 more sources

A fingerprint encryption scheme based on irreversible function and secure authentication. [PDF]

open access: yesComput Math Methods Med, 2015
A fingerprint encryption scheme based on irreversible function has been designed in this paper. Since the fingerprint template includes almost the entire information of users’ fingerprints, the personal authentication can be determined only by the fingerprint features.
Yang Y, Yu J, Zhang P, Wang S.
europepmc   +2 more sources

The Applications of Blockchain in the Covert Communication

open access: yesWireless Communications and Mobile Computing, Volume 2022, Issue 1, 2022., 2022
Covert communication is designed for hiding the subliminal communication which takes place between both of the speakers and their relationship. The traditional covert communication utilizes the centralized channel and the third‐party central node or authority to distribute messages which leads to a lack of undetectability, antitraceability, and ...
Bangyao Du   +5 more
wiley   +1 more source

Data Integrity Time Optimization of a Blockchain IoT Smart Home Network Using Different Consensus and Hash Algorithms

open access: yesWireless Communications and Mobile Computing, Volume 2021, Issue 1, 2021., 2021
Data security is a major issue for smart home networks. Yet, different existing tools and techniques have not been proven highly effective for home networks’ data security. Blockchain is a promising technology because of the distributed computing infrastructure network that makes it difficult for hackers to intrude into the systems through the use of ...
Ammar Riadh Kairaldeen   +4 more
wiley   +1 more source

Blockchain as a CA: A Provably Secure Signcryption Scheme Leveraging Blockchains

open access: yesSecurity and Communication Networks, Volume 2021, Issue 1, 2021., 2021
Although encryption and signatures have been two fundamental technologies for cryptosystems, they still receive considerable attention in academia due to the focus on reducing computational costs and communication overhead. In the past decade, applying certificateless signcryption schemes to solve the higher cost of maintaining the certificate chain ...
Tzung-Her Chen   +4 more
wiley   +1 more source

BBAAS: Blockchain‐Based Anonymous Authentication Scheme for Providing Secure Communication in VANETs

open access: yesSecurity and Communication Networks, Volume 2021, Issue 1, 2021., 2021
Smart driving has become conceivable due to the rapid growth of vehicular ad hoc networks. VANETs are considered as the main platform for providing safety road information and instant vehicle communication. Nevertheless, due to the open wireless nature of communication channels, VANET is susceptible to security attacks by malicious users.
Azees Maria   +5 more
wiley   +1 more source

SSPSoC: A Secure SDN‐Based Protocol over MPSoC

open access: yesSecurity and Communication Networks, Volume 2019, Issue 1, 2019., 2019
In recent years, Multi‐Processor System‐on‐Chips (MPSoCs) are widely deployed in safety‐critical embedded systems. The Cloud‐of‐Chips (CoC) is a scalable MPSoC architecture comprised of a large number of interconnected Integrated Circuits (IC) and Processing Clusters (PC) destined for critical systems.
Soultana Ellinidou   +6 more
wiley   +1 more source

Home - About - Disclaimer - Privacy