Results 11 to 20 of about 311,948 (105)

Power Efficiency in Unfolding RIPEMD-160: Dynamic Power Analysis Using Gray Encoding in FPGA Design

open access: diamondJournal of Physics: Conference Series
The RIPEMD-160 hash functions are extensively used in many cryptographic applications, including digital signatures, Hash Message Authentication Codes (HMAC) and others. Unfolding RIPEMD-160 was designed to analyse the architecture of the design in terms
Shamsiah Suhaili   +3 more
semanticscholar   +3 more sources

ChaoticRIPE: Strengthening RIPEMD-160 with the Chirikov Standard Map for Enhanced Cryptographic Security

open access: goldArtificial Intelligence, Soft Computing And Application Trends 2025
Advancements in communication and storage technologies need robust encryption tools to protect data. Cryptographic hash functions are crucial in maintaining data integrity and security by turning variable-length inputs into fixed-size digests. RIPEMD-160
Suparn Padma Patra, Mamta Rani
semanticscholar   +3 more sources

Improved Preimage Attacks on RIPEMD-160 and HAS-160 [PDF]

open access: bronzeKSII Transactions on Internet and Information Systems, 2018
Yanzhao Shen, Gaoli Wang
semanticscholar   +3 more sources

Multiple Securities for Cloud Computing Using RIPEMD-160

open access: greenSSRN Electronic Journal, 2017
Cloud facing many new security threats day by day the threats are vulnerable and reduces the confidentiality of the cloud secure cloud from these various attacks, here a multiple security aspect is proposed to make the cloud more secure. There are dozens of security has been reported till now, in that in this paper it is tried to secure the cloud from ...
S. Kshipra Prasadh, S. Sivasubramanian
semanticscholar   +3 more sources

Authentication with RIPEMD-160 and Other Alternatives: A Hardware Design Perspective [PDF]

open access: hybrid, 2010
Taking into consideration the rapid evolution of communication standards that include message authentication and integrity verification, it is realized that constructions like MAC and HMAC, are widely used in the most popular cryptographic schemes since ...
Harris E. Michail   +5 more
semanticscholar   +6 more sources

Complexity Analysis of Distinguishing Attack on 51-step RIPEMD-160 [PDF]

open access: greenJisuanji gongcheng, 2019
SASAKI Y,et al used message modification technology to differentiate attack on 51-step RIPEMD-160(Lecture Notes in Computer Science,Vol.7341),but they did not consider the influence of modular subtraction difference on differential routes,and could not ...
CUI Binbin, WANG Gaoli
doaj   +3 more sources

Throughput Enhancement of the RIPEMD-160 Design Using the Unfolding Transformation Technique [PDF]

open access: yes, 2021
: Many cryptographic applications use RIPEMD-160 hash functions, such as digital signatures, Hash Message Authentication Code (HMAC), and other data security applications.
Norhuzaimin, Julai   +2 more
core   +3 more sources

A fingerprint encryption scheme based on irreversible function and secure authentication. [PDF]

open access: yesComput Math Methods Med, 2015
A fingerprint encryption scheme based on irreversible function has been designed in this paper. Since the fingerprint template includes almost the entire information of users’ fingerprints, the personal authentication can be determined only by the fingerprint features.
Yang Y, Yu J, Zhang P, Wang S.
europepmc   +2 more sources

Efficient Pipelined Hardware Implementation Of Ripemd-160 Hash Function

open access: green, 2008
{"references": ["RFC 2510 - Internet X.509 PKI - Certificate Management Protocols,\navailable at www.ietf.org/rfc/rfc2510.txt", "SP800-77 , Guide to IPSec VPN-s, National Institute of Standards and\nTechnology (NIST).", "Secure Electronic Transactions: An Overview, available at\nwww.davidreilly.com/topics/electronic_commerce/essays/secure_electro ...
Harris E. Michail   +4 more
openalex   +2 more sources

Home - About - Disclaimer - Privacy