Results 21 to 30 of about 750 (85)

On hash functions using checksums [PDF]

open access: yes, 2008
We analyse the security of iterated hash functions that compute an input dependent checksum which is processed as part of the hash computation. We show that a large class of such schemes, including those using non-linear or even one-way checksum ...
J. Hoch   +7 more
core   +3 more sources

Authentication with RIPEMD-160 and Other Alternatives: A Hardware Design Perspective [PDF]

open access: yes, 2010
In this chapter two ways of providing authentication services (HMAC and CMAC) have been presented. Certain applications' criteria that have to be taken into consideration to choose between CMAC and HMAC were stated. Implementation details and system architecture were provided for both alternatives focusing on the manageability of these designs so as to
Michail, H.   +5 more
openaire   +3 more sources

Improving the SLA-based management of QoS for secure multimedia services [PDF]

open access: yes, 2005
This paper proposes to integrate security parameters into the Service Level Specification (SLS) template proposed in the Tequila project to improve SLA-based management of QoS [8], [21].
Duflos, S   +3 more
core   +3 more sources

Efficient Pipelined Hardware Implementation Of Ripemd-160 Hash Function

open access: yes, 2008
{"references": ["RFC 2510 - Internet X.509 PKI - Certificate Management Protocols,\navailable at www.ietf.org/rfc/rfc2510.txt", "SP800-77 , Guide to IPSec VPN-s, National Institute of Standards and\nTechnology (NIST).", "Secure Electronic Transactions: An Overview, available at\nwww.davidreilly.com/topics/electronic_commerce/essays/secure_electro ...
H. E. Michail   +4 more
openaire   +1 more source

New Records in Collision Attacks on RIPEMD-160 and SHA-256 [PDF]

open access: yes, 2023
RIPEMD-160 and SHA-256 are two hash functions used to generate the bitcoin address. In particular, RIPEMD-160 is an ISO/IEC standard and SHA-256 has been widely used in the world.
Fukang Liu, Gaoli Wang, Yingxin Li
core  

Enhancement in TLS Authentication with RIPEMD-160

open access: yesInternational Journal of Advance Research and Innovation, 2014
This paper describes one of the security feature authentication. The main goal of this research is to achieve authentication to identify legal user and minimize the chance of attacks. Internet is open to every body to access and share information on it.
openaire   +1 more source

Аналіз безпеки МАС алгоритмів стандарту ISO/IEC 9797-2 [PDF]

open access: yes, 2007
Розглянути MAC-алгоритми, що визначені у стандарті ISO/IEC 9797-2, проведено аналіз їх безпечності до основних атак.MAC-algorithms which are certain in the standard ISO/IEC 9797-2 are considered, the analysis from safety to the basic attacks is ...
Дунь, Олексій   +3 more
core  

Encryption in the past, present, and future : an honors thesis (HONRS 499) [PDF]

open access: yes, 2007
To ensure the confidentiality and integrity of data in storage and transit, various cryptography systems have been developed. Each of these systems has individual strengths and weaknesses.
Surma, Eric W.
core  

Hashing of Message

open access: yesAdvances in Electrical and Electronic Engineering, 2003
For identification of any message it is not necessary to have available all message, but it is sufficient for its autentication its hashing. Hashing is used at safe put passwords, decode keys, autentication its hashing.
Ladislav Schwartz, Dusan Trstensky
doaj  

Криптографические основания разработки стандарта СТ РК 1073-2002 [PDF]

open access: yes, 2004
Constructing conception of the standard ST RK 1073-2002 "Means of cryptographic information protection. General technical requirements", general requirements for MCIP, reasons of the selection of allowable ranges of basic parameter values of ...
Абдрахманов, Альжан   +1 more
core  

Home - About - Disclaimer - Privacy