A Critical Cybersecurity Analysis and Future Research Directions for the Internet of Things: A Comprehensive Review. [PDF]
Tariq U, Ahmed I, Bashir AK, Shaukat K.
europepmc +1 more source
Collisions and Semi-Free-Start Collisions for Round-Reduced RIPEMD-160 [PDF]
In this paper, we propose an improved cryptanalysis of the double-branch hash function RIPEMD-160 standardized by ISO/IEC. Firstly, we show how to theoretically calculate the step differential probability of RIPEMD-160, which was stated as an open ...
Florian Mendel, Fukang Liu, Gaoli Wang
core
Криптографические основания разработки стандарта СТ РК 1073-2007 [PDF]
Constructing conception of the standard ST RK 1073-2007 "Means of cryptographic information protection. General technical requirements", general requirements for MCIP, reasons of the selection of allowable ranges of basic parameter values of ...
Абдрахманов, Альжан +1 more
core
Efficient quantum circuit implementations of SM3 and RIPEMD-160 Hash functions
The development of quantum computing technology poses potential threats to the security of existing cryptographic algorithms, making it urgent to develop efficient quantum circuit implementation schemes to support security assessments.
ZOU Jian, GUO Nansheng, LI Junkang
doaj
An SHA-3 Hardware Architecture against Failures Based on Hamming Codes and Triple Modular Redundancy. [PDF]
Torres-Alvarado A +5 more
europepmc +1 more source
Design and Testing of a Computer Security Layer for the LIN Bus. [PDF]
Páez F, Kaschel H.
europepmc +1 more source
Problems of digital sustainability [PDF]
The article introduces digital communication by drawing comparisons between the histories of digital and conventional written communication. It also shows the technical and legal bases and the currently reached achievements.
Szádeczky, Tamás
core
Malicious cryptography techniques for unreversable (malicious or not) binaries [PDF]
Fighting against computer malware require a mandatory step of reverse engineering. As soon as the code has been disassemblied/decompiled (including a dynamic analysis step), there is a hope to understand what the malware actually does and to implement a ...
Filiol, Eric
core
Adoption and sustainability of bitcoin and the blockchain technology in Nigeria. [PDF]
Onyekwere E, Ogwueleka FN, Irhebhude ME.
europepmc +1 more source
Bitcoin Protocol Main Threats [PDF]
In this paper we explain the basics of Bitcoin protocol and the state of the art of the main attacks to it. We first present an overview of digital currencies, showing what they are and the social need they aim to satisfy.
Di Francesco Maesa, Damiano
core

