Results 21 to 30 of about 311,948 (105)

Efficient quantum circuit implementations of SM3 and RIPEMD-160 Hash functions

open access: greenTongxin xuebao
The development of quantum computing technology poses potential threats to the security of existing cryptographic algorithms, making it urgent to develop efficient quantum circuit implementation schemes to support security assessments.
ZOU Jian, GUO Nansheng, LI Junkang
doaj   +1 more source

Improved Semi-Free-Start Collision Attacks on RIPEMD-160 [PDF]

open access: bronzeInternational Conference on the Theory and Application of Cryptology and Information Security
Zhuolong Zhang   +5 more
openalex   +2 more sources

RIPEMD-160: A strengthened version of RIPEMD

open access: greenFast Software Encryption Workshop, 1996
Hans Dobbertin   +2 more
semanticscholar   +4 more sources

2-Dimension Sums: Distinguishers Beyond Three Rounds of RIPEMD-128 and RIPEMD-160 [PDF]

open access: closed, 2012
This paper presents differential-based distinguishers against ISO standard hash functions RIPEMD-128 and RIPEMD-160. The compression functions of RIPEMD-128/-160 adopt the double-branch structure, which updates a chaining variable by computing two ...
Lei Wang, Yu Sasaki
core   +1 more source

Improved Cryptanalysis of Reduced RIPEMD-160

open access: closedInternational Conference on the Theory and Application of Cryptology and Information Security, 2013
Florian Mendel   +4 more
semanticscholar   +3 more sources

The Applications of Blockchain in the Covert Communication

open access: yesWireless Communications and Mobile Computing, Volume 2022, Issue 1, 2022., 2022
Covert communication is designed for hiding the subliminal communication which takes place between both of the speakers and their relationship. The traditional covert communication utilizes the centralized channel and the third‐party central node or authority to distribute messages which leads to a lack of undetectability, antitraceability, and ...
Bangyao Du   +5 more
wiley   +1 more source

Design and Analysis of New Version of Cryptographic Hash Function Based on Improved Chaotic Maps With Induced DNA Sequences

open access: yesIEEE Access, 2023
One of the first and most used hashing algorithms in blockchains is SHA-256 so the main aim of this paper is how to increase the security level of the blockchain based on the increasing hashing algorithm security.
Salwa M. Serag Eldin   +7 more
doaj   +1 more source

Data Integrity Time Optimization of a Blockchain IoT Smart Home Network Using Different Consensus and Hash Algorithms

open access: yesWireless Communications and Mobile Computing, Volume 2021, Issue 1, 2021., 2021
Data security is a major issue for smart home networks. Yet, different existing tools and techniques have not been proven highly effective for home networks’ data security. Blockchain is a promising technology because of the distributed computing infrastructure network that makes it difficult for hackers to intrude into the systems through the use of ...
Ammar Riadh Kairaldeen   +4 more
wiley   +1 more source

Blockchain as a CA: A Provably Secure Signcryption Scheme Leveraging Blockchains

open access: yesSecurity and Communication Networks, Volume 2021, Issue 1, 2021., 2021
Although encryption and signatures have been two fundamental technologies for cryptosystems, they still receive considerable attention in academia due to the focus on reducing computational costs and communication overhead. In the past decade, applying certificateless signcryption schemes to solve the higher cost of maintaining the certificate chain ...
Tzung-Her Chen   +4 more
wiley   +1 more source

BBAAS: Blockchain‐Based Anonymous Authentication Scheme for Providing Secure Communication in VANETs

open access: yesSecurity and Communication Networks, Volume 2021, Issue 1, 2021., 2021
Smart driving has become conceivable due to the rapid growth of vehicular ad hoc networks. VANETs are considered as the main platform for providing safety road information and instant vehicle communication. Nevertheless, due to the open wireless nature of communication channels, VANET is susceptible to security attacks by malicious users.
Azees Maria   +5 more
wiley   +1 more source

Home - About - Disclaimer - Privacy