Results 41 to 50 of about 750 (85)

Collisions and Semi-Free-Start Collisions for Round-Reduced RIPEMD-160 [PDF]

open access: yes, 2018
In this paper, we propose an improved cryptanalysis of the double-branch hash function RIPEMD-160 standardized by ISO/IEC. Firstly, we show how to theoretically calculate the step differential probability of RIPEMD-160, which was stated as an open ...
Florian Mendel, Fukang Liu, Gaoli Wang
core  

Криптографические основания разработки стандарта СТ РК 1073-2007 [PDF]

open access: yes, 2008
Constructing conception of the standard ST RK 1073-2007 "Means of cryptographic information protection. General technical requirements", general requirements for MCIP, reasons of the selection of allowable ranges of basic parameter values of ...
Абдрахманов, Альжан   +1 more
core  

Efficient quantum circuit implementations of SM3 and RIPEMD-160 Hash functions

open access: yesTongxin xuebao
The development of quantum computing technology poses potential threats to the security of existing cryptographic algorithms, making it urgent to develop efficient quantum circuit implementation schemes to support security assessments.
ZOU Jian, GUO Nansheng, LI Junkang
doaj  

An SHA-3 Hardware Architecture against Failures Based on Hamming Codes and Triple Modular Redundancy. [PDF]

open access: yesSensors (Basel), 2022
Torres-Alvarado A   +5 more
europepmc   +1 more source

Problems of digital sustainability [PDF]

open access: yes, 2010
The article introduces digital communication by drawing comparisons between the histories of digital and conventional written communication. It also shows the technical and legal bases and the currently reached achievements.
Szádeczky, Tamás
core  

Malicious cryptography techniques for unreversable (malicious or not) binaries [PDF]

open access: yes, 2010
Fighting against computer malware require a mandatory step of reverse engineering. As soon as the code has been disassemblied/decompiled (including a dynamic analysis step), there is a hope to understand what the malware actually does and to implement a ...
Filiol, Eric
core  

Adoption and sustainability of bitcoin and the blockchain technology in Nigeria. [PDF]

open access: yesInt J Inf Technol, 2023
Onyekwere E, Ogwueleka FN, Irhebhude ME.
europepmc   +1 more source

Bitcoin Protocol Main Threats [PDF]

open access: yes, 2017
In this paper we explain the basics of Bitcoin protocol and the state of the art of the main attacks to it. We first present an overview of digital currencies, showing what they are and the social need they aim to satisfy.
Di Francesco Maesa, Damiano
core  

Home - About - Disclaimer - Privacy