Results 31 to 40 of about 311,948 (105)

Distinguishers beyond Three Rounds of the RIPEMD-128/-160 Compression Functions

open access: closedInternational Conference on Applied Cryptography and Network Security, 2012
Yu Sasaki, Lei Wang
openalex   +2 more sources

TumbleBit: an untrusted Bitcoin-compatible anonymous payment hub [PDF]

open access: yes, 2017
This paper presents TumbleBit, a new unidirectional unlinkable payment hub that is fully compatible with today s Bitcoin protocol. TumbleBit allows parties to make fast, anonymous, off-blockchain payments through an untrusted intermediary called the ...
AlShenibr, Leen   +4 more
core   +2 more sources

SSPSoC: A Secure SDN‐Based Protocol over MPSoC

open access: yesSecurity and Communication Networks, Volume 2019, Issue 1, 2019., 2019
In recent years, Multi‐Processor System‐on‐Chips (MPSoCs) are widely deployed in safety‐critical embedded systems. The Cloud‐of‐Chips (CoC) is a scalable MPSoC architecture comprised of a large number of interconnected Integrated Circuits (IC) and Processing Clusters (PC) destined for critical systems.
Soultana Ellinidou   +6 more
wiley   +1 more source

New Records in Collision Attacks on RIPEMD-160 and SHA-256 [PDF]

open access: yes, 2023
RIPEMD-160 and SHA-256 are two hash functions used to generate the bitcoin address. In particular, RIPEMD-160 is an ISO/IEC standard and SHA-256 has been widely used in the world.
Fukang Liu, Gaoli Wang, Yingxin Li
core  

Detecting brute-force attacks on cryptocurrency wallets

open access: yes, 2019
Blockchain is a distributed ledger, which is protected against malicious modifications by means of cryptographic tools, e.g. digital signatures and hash functions. One of the most prominent applications of blockchains is cryptocurrencies, such as Bitcoin.
AK Fedorov   +10 more
core   +1 more source

High Throughput Implementation of RIPEMD-160 using Unfolding Transformation [PDF]

open access: yes, 2018
Cryptographic hash function is important for digital signature, Hash Message Authentication Code (HMAC) and other data security application. There are different types of hash function such as MD5, SHA-1, RIPEMD-160, SHA-2 and others.
Kuryati, Binti Kipli   +5 more
core  

Аналіз безпеки МАС алгоритмів стандарту ISO/IEC 9797-2 [PDF]

open access: yes, 2007
Розглянути MAC-алгоритми, що визначені у стандарті ISO/IEC 9797-2, проведено аналіз їх безпечності до основних атак.MAC-algorithms which are certain in the standard ISO/IEC 9797-2 are considered, the analysis from safety to the basic attacks is ...
Дунь, Олексій   +3 more
core  

Az elektronikus írásbeliség és problémái [PDF]

open access: yes, 2009
In situ plan.
Anders Bjerregaard (3728932)   +4 more
core   +4 more sources

Hashing of Message

open access: yesAdvances in Electrical and Electronic Engineering, 2003
For identification of any message it is not necessary to have available all message, but it is sufficient for its autentication its hashing. Hashing is used at safe put passwords, decode keys, autentication its hashing.
Ladislav Schwartz, Dusan Trstensky
doaj  

Collisions and Semi-Free-Start Collisions for Round-Reduced RIPEMD-160 [PDF]

open access: yes, 2018
In this paper, we propose an improved cryptanalysis of the double-branch hash function RIPEMD-160 standardized by ISO/IEC. Firstly, we show how to theoretically calculate the step differential probability of RIPEMD-160, which was stated as an open ...
Florian Mendel, Fukang Liu, Gaoli Wang
core  

Home - About - Disclaimer - Privacy