Results 21 to 30 of about 750 (85)
On hash functions using checksums [PDF]
We analyse the security of iterated hash functions that compute an input dependent checksum which is processed as part of the hash computation. We show that a large class of such schemes, including those using non-linear or even one-way checksum ...
J. Hoch +7 more
core +3 more sources
Authentication with RIPEMD-160 and Other Alternatives: A Hardware Design Perspective [PDF]
In this chapter two ways of providing authentication services (HMAC and CMAC) have been presented. Certain applications' criteria that have to be taken into consideration to choose between CMAC and HMAC were stated. Implementation details and system architecture were provided for both alternatives focusing on the manageability of these designs so as to
Michail, H. +5 more
openaire +3 more sources
Improving the SLA-based management of QoS for secure multimedia services [PDF]
This paper proposes to integrate security parameters into the Service Level Specification (SLS) template proposed in the Tequila project to improve SLA-based management of QoS [8], [21].
Duflos, S +3 more
core +3 more sources
Efficient Pipelined Hardware Implementation Of Ripemd-160 Hash Function
{"references": ["RFC 2510 - Internet X.509 PKI - Certificate Management Protocols,\navailable at www.ietf.org/rfc/rfc2510.txt", "SP800-77 , Guide to IPSec VPN-s, National Institute of Standards and\nTechnology (NIST).", "Secure Electronic Transactions: An Overview, available at\nwww.davidreilly.com/topics/electronic_commerce/essays/secure_electro ...
H. E. Michail +4 more
openaire +1 more source
New Records in Collision Attacks on RIPEMD-160 and SHA-256 [PDF]
RIPEMD-160 and SHA-256 are two hash functions used to generate the bitcoin address. In particular, RIPEMD-160 is an ISO/IEC standard and SHA-256 has been widely used in the world.
Fukang Liu, Gaoli Wang, Yingxin Li
core
Enhancement in TLS Authentication with RIPEMD-160
This paper describes one of the security feature authentication. The main goal of this research is to achieve authentication to identify legal user and minimize the chance of attacks. Internet is open to every body to access and share information on it.
openaire +1 more source
Аналіз безпеки МАС алгоритмів стандарту ISO/IEC 9797-2 [PDF]
Розглянути MAC-алгоритми, що визначені у стандарті ISO/IEC 9797-2, проведено аналіз їх безпечності до основних атак.MAC-algorithms which are certain in the standard ISO/IEC 9797-2 are considered, the analysis from safety to the basic attacks is ...
Дунь, Олексій +3 more
core
Encryption in the past, present, and future : an honors thesis (HONRS 499) [PDF]
To ensure the confidentiality and integrity of data in storage and transit, various cryptography systems have been developed. Each of these systems has individual strengths and weaknesses.
Surma, Eric W.
core
For identification of any message it is not necessary to have available all message, but it is sufficient for its autentication its hashing. Hashing is used at safe put passwords, decode keys, autentication its hashing.
Ladislav Schwartz, Dusan Trstensky
doaj
Криптографические основания разработки стандарта СТ РК 1073-2002 [PDF]
Constructing conception of the standard ST RK 1073-2002 "Means of cryptographic information protection. General technical requirements", general requirements for MCIP, reasons of the selection of allowable ranges of basic parameter values of ...
Абдрахманов, Альжан +1 more
core

