Results 31 to 40 of about 311,948 (105)
Distinguishers beyond Three Rounds of the RIPEMD-128/-160 Compression Functions
Yu Sasaki, Lei Wang
openalex +2 more sources
TumbleBit: an untrusted Bitcoin-compatible anonymous payment hub [PDF]
This paper presents TumbleBit, a new unidirectional unlinkable payment hub that is fully compatible with today s Bitcoin protocol. TumbleBit allows parties to make fast, anonymous, off-blockchain payments through an untrusted intermediary called the ...
AlShenibr, Leen +4 more
core +2 more sources
SSPSoC: A Secure SDN‐Based Protocol over MPSoC
In recent years, Multi‐Processor System‐on‐Chips (MPSoCs) are widely deployed in safety‐critical embedded systems. The Cloud‐of‐Chips (CoC) is a scalable MPSoC architecture comprised of a large number of interconnected Integrated Circuits (IC) and Processing Clusters (PC) destined for critical systems.
Soultana Ellinidou +6 more
wiley +1 more source
New Records in Collision Attacks on RIPEMD-160 and SHA-256 [PDF]
RIPEMD-160 and SHA-256 are two hash functions used to generate the bitcoin address. In particular, RIPEMD-160 is an ISO/IEC standard and SHA-256 has been widely used in the world.
Fukang Liu, Gaoli Wang, Yingxin Li
core
Detecting brute-force attacks on cryptocurrency wallets
Blockchain is a distributed ledger, which is protected against malicious modifications by means of cryptographic tools, e.g. digital signatures and hash functions. One of the most prominent applications of blockchains is cryptocurrencies, such as Bitcoin.
AK Fedorov +10 more
core +1 more source
High Throughput Implementation of RIPEMD-160 using Unfolding Transformation [PDF]
Cryptographic hash function is important for digital signature, Hash Message Authentication Code (HMAC) and other data security application. There are different types of hash function such as MD5, SHA-1, RIPEMD-160, SHA-2 and others.
Kuryati, Binti Kipli +5 more
core
Аналіз безпеки МАС алгоритмів стандарту ISO/IEC 9797-2 [PDF]
Розглянути MAC-алгоритми, що визначені у стандарті ISO/IEC 9797-2, проведено аналіз їх безпечності до основних атак.MAC-algorithms which are certain in the standard ISO/IEC 9797-2 are considered, the analysis from safety to the basic attacks is ...
Дунь, Олексій +3 more
core
Az elektronikus írásbeliség és problémái [PDF]
In situ plan.
Anders Bjerregaard (3728932) +4 more
core +4 more sources
For identification of any message it is not necessary to have available all message, but it is sufficient for its autentication its hashing. Hashing is used at safe put passwords, decode keys, autentication its hashing.
Ladislav Schwartz, Dusan Trstensky
doaj
Collisions and Semi-Free-Start Collisions for Round-Reduced RIPEMD-160 [PDF]
In this paper, we propose an improved cryptanalysis of the double-branch hash function RIPEMD-160 standardized by ISO/IEC. Firstly, we show how to theoretically calculate the step differential probability of RIPEMD-160, which was stated as an open ...
Florian Mendel, Fukang Liu, Gaoli Wang
core

