Results 11 to 20 of about 750 (85)
A unified architecture of MD5 and RIPEMD-160 hash algorithms [PDF]
Hash algorithms are important components in many cryptographic applications and security protocol suites. In this paper, a unified architecture for MD5 and RIPEMD-160 hash algorithms is developed.
Ng, CW, Ng, TS, Yip, KW
core +2 more sources
RIPEMD-160: A strengthened version of RIPEMD [PDF]
Cryptographic hash functions are an important tool in cryptography for applications such as digital fingerprinting of messages, message authentication, and key derivation. During the last five years, several fast software hash functions have been proposed; most of them are based on the design principles of Ron Rivest's MD4. One such proposal was RIPEMD,
Dobbertin, Hans +2 more
+12 more sources
Differential Attacks on Reduced RIPEMD-160 [PDF]
In this work, we provide the first security analysis of reduced RIPEMD-160 regarding its collision resistance with practical complexity. The ISO/IEC standard RIPEMD-160 was proposed 15 years ago and may be used as a drop-in replacement for SHA-1 due to their same hash output length.
Mendel, Florian +3 more
+8 more sources
Analysis of RIPEMD-160: New Collision Attacks and Finding Characteristics with MILP [PDF]
The hash function RIPEMD-160 is an ISO/IEC standard and is being used to generate the bitcoin address together with SHA-256. Despite the fact that many hash functions in the MD-SHA hash family have been broken, RIPEMD-160 remains secure and the best ...
Fukang Liu +6 more
core +2 more sources
A fingerprint encryption scheme based on irreversible function and secure authentication. [PDF]
A fingerprint encryption scheme based on irreversible function has been designed in this paper. Since the fingerprint template includes almost the entire information of users’ fingerprints, the personal authentication can be determined only by the fingerprint features.
Yang Y, Yu J, Zhang P, Wang S.
europepmc +2 more sources
The Applications of Blockchain in the Covert Communication
Covert communication is designed for hiding the subliminal communication which takes place between both of the speakers and their relationship. The traditional covert communication utilizes the centralized channel and the third‐party central node or authority to distribute messages which leads to a lack of undetectability, antitraceability, and ...
Bangyao Du +5 more
wiley +1 more source
Data security is a major issue for smart home networks. Yet, different existing tools and techniques have not been proven highly effective for home networks’ data security. Blockchain is a promising technology because of the distributed computing infrastructure network that makes it difficult for hackers to intrude into the systems through the use of ...
Ammar Riadh Kairaldeen +4 more
wiley +1 more source
Blockchain as a CA: A Provably Secure Signcryption Scheme Leveraging Blockchains
Although encryption and signatures have been two fundamental technologies for cryptosystems, they still receive considerable attention in academia due to the focus on reducing computational costs and communication overhead. In the past decade, applying certificateless signcryption schemes to solve the higher cost of maintaining the certificate chain ...
Tzung-Her Chen +4 more
wiley +1 more source
BBAAS: Blockchain‐Based Anonymous Authentication Scheme for Providing Secure Communication in VANETs
Smart driving has become conceivable due to the rapid growth of vehicular ad hoc networks. VANETs are considered as the main platform for providing safety road information and instant vehicle communication. Nevertheless, due to the open wireless nature of communication channels, VANET is susceptible to security attacks by malicious users.
Azees Maria +5 more
wiley +1 more source
SSPSoC: A Secure SDN‐Based Protocol over MPSoC
In recent years, Multi‐Processor System‐on‐Chips (MPSoCs) are widely deployed in safety‐critical embedded systems. The Cloud‐of‐Chips (CoC) is a scalable MPSoC architecture comprised of a large number of interconnected Integrated Circuits (IC) and Processing Clusters (PC) destined for critical systems.
Soultana Ellinidou +6 more
wiley +1 more source

