An Implementation of Trust Chain Framework with Hierarchical Content Identifier Mechanism by Using Blockchain Technology. [PDF]
Chen HC +10 more
europepmc +1 more source
NSA Suite-B Cryptography algorithms [PDF]
Tato bakalářská práce s názvem Skupina algoritmů NSA Suite B Cryptography se zabývá algoritmy, které obsahuje sada Suite B. Ty slouží k větší ochraně dat a bezpečnosti při jejich přenosu přes nezabezpečené prostředí internetu. Dále obsahuje rozbor těchto
Rybka, Štěpán
core
Medical image integrity control combining digital signature and lossless watermarking
International audienceEnforcing protection of medical content becomes a major issue of computer security. Since medical contents are more and more widely distributed, it is necessary to develop security mechanism to guarantee their confidentiality ...
Coatrieux, Gouenou +4 more
core +2 more sources
Secure Covid-19 Electronic Health Records Management for Telediagnosis and Travel Ticket Assistant System Using Cryptographic Approaches. [PDF]
Falmari VR, Brindha M, Ko S.
europepmc +1 more source
A secure and decentralized SSI authentication protocol with privacy protection and fine-grained access control based on federated blockchain. [PDF]
Ma B +5 more
europepmc +1 more source
State-of-the-Art Software-Based Remote Attestation: Opportunities and Open Issues for Internet of Things. [PDF]
Ankergård SFJJ, Dushku E, Dragoni N.
europepmc +1 more source
Power Efficiency in Unfolding RIPEMD-160: Dynamic Power Analysis Using Gray Encoding in FPGA Design
Abstract The RIPEMD-160 hash functions are extensively used in many cryptographic applications, including digital signatures, Hash Message Authentication Codes (HMAC) and others. Unfolding RIPEMD-160 was designed to analyse the architecture of the design in terms of ALUTs area and design speed.
Shamsiah Suhaili +3 more
openaire +1 more source
2-Dimension Sums: Distinguishers Beyond Three Rounds of RIPEMD-128 and RIPEMD-160 [PDF]
This paper presents differential-based distinguishers against ISO standard hash functions RIPEMD-128 and RIPEMD-160. The compression functions of RIPEMD-128/-160 adopt the double-branch structure, which updates a chaining variable by computing two ...
Lei Wang, Yu Sasaki
core
A Blockchain-Based Secure Image Encryption Scheme for the Industrial Internet of Things. [PDF]
Khan PW, Byun Y.
europepmc +1 more source
Automating Collision Attacks on RIPEMD-160 [PDF]
As an ISO/IEC standard, the hash function RIPEMD-160 has been used to generate the Bitcoin address with SHA-256. However, due to the complex double-branch structure of RIPEMD-160, the best collision attack only reaches 36 out of 80 steps of RIPEMD-160 ...
Fukang Liu, Gaoli Wang, Yingxin Li
core

