Results 21 to 30 of about 311,948 (105)
Efficient quantum circuit implementations of SM3 and RIPEMD-160 Hash functions
The development of quantum computing technology poses potential threats to the security of existing cryptographic algorithms, making it urgent to develop efficient quantum circuit implementation schemes to support security assessments.
ZOU Jian, GUO Nansheng, LI Junkang
doaj +1 more source
Improved Semi-Free-Start Collision Attacks on RIPEMD-160 [PDF]
Zhuolong Zhang +5 more
openalex +2 more sources
RIPEMD-160: A strengthened version of RIPEMD
Hans Dobbertin +2 more
semanticscholar +4 more sources
2-Dimension Sums: Distinguishers Beyond Three Rounds of RIPEMD-128 and RIPEMD-160 [PDF]
This paper presents differential-based distinguishers against ISO standard hash functions RIPEMD-128 and RIPEMD-160. The compression functions of RIPEMD-128/-160 adopt the double-branch structure, which updates a chaining variable by computing two ...
Lei Wang, Yu Sasaki
core +1 more source
Improved Cryptanalysis of Reduced RIPEMD-160
Florian Mendel +4 more
semanticscholar +3 more sources
The Applications of Blockchain in the Covert Communication
Covert communication is designed for hiding the subliminal communication which takes place between both of the speakers and their relationship. The traditional covert communication utilizes the centralized channel and the third‐party central node or authority to distribute messages which leads to a lack of undetectability, antitraceability, and ...
Bangyao Du +5 more
wiley +1 more source
One of the first and most used hashing algorithms in blockchains is SHA-256 so the main aim of this paper is how to increase the security level of the blockchain based on the increasing hashing algorithm security.
Salwa M. Serag Eldin +7 more
doaj +1 more source
Data security is a major issue for smart home networks. Yet, different existing tools and techniques have not been proven highly effective for home networks’ data security. Blockchain is a promising technology because of the distributed computing infrastructure network that makes it difficult for hackers to intrude into the systems through the use of ...
Ammar Riadh Kairaldeen +4 more
wiley +1 more source
Blockchain as a CA: A Provably Secure Signcryption Scheme Leveraging Blockchains
Although encryption and signatures have been two fundamental technologies for cryptosystems, they still receive considerable attention in academia due to the focus on reducing computational costs and communication overhead. In the past decade, applying certificateless signcryption schemes to solve the higher cost of maintaining the certificate chain ...
Tzung-Her Chen +4 more
wiley +1 more source
BBAAS: Blockchain‐Based Anonymous Authentication Scheme for Providing Secure Communication in VANETs
Smart driving has become conceivable due to the rapid growth of vehicular ad hoc networks. VANETs are considered as the main platform for providing safety road information and instant vehicle communication. Nevertheless, due to the open wireless nature of communication channels, VANET is susceptible to security attacks by malicious users.
Azees Maria +5 more
wiley +1 more source

