Results 51 to 60 of about 750 (85)

An Implementation of Trust Chain Framework with Hierarchical Content Identifier Mechanism by Using Blockchain Technology. [PDF]

open access: yesSensors (Basel), 2022
Chen HC   +10 more
europepmc   +1 more source

NSA Suite-B Cryptography algorithms [PDF]

open access: yes, 2011
Tato bakalářská práce s názvem Skupina algoritmů NSA Suite B Cryptography se zabývá algoritmy, které obsahuje sada Suite B. Ty slouží k větší ochraně dat a bezpečnosti při jejich přenosu přes nezabezpečené prostředí internetu. Dále obsahuje rozbor těchto
Rybka, Štěpán
core  

Medical image integrity control combining digital signature and lossless watermarking

open access: yes, 2009
International audienceEnforcing protection of medical content becomes a major issue of computer security. Since medical contents are more and more widely distributed, it is necessary to develop security mechanism to guarantee their confidentiality ...
Coatrieux, Gouenou   +4 more
core   +2 more sources

Power Efficiency in Unfolding RIPEMD-160: Dynamic Power Analysis Using Gray Encoding in FPGA Design

open access: yesJournal of Physics: Conference Series
Abstract The RIPEMD-160 hash functions are extensively used in many cryptographic applications, including digital signatures, Hash Message Authentication Codes (HMAC) and others. Unfolding RIPEMD-160 was designed to analyse the architecture of the design in terms of ALUTs area and design speed.
Shamsiah Suhaili   +3 more
openaire   +1 more source

2-Dimension Sums: Distinguishers Beyond Three Rounds of RIPEMD-128 and RIPEMD-160 [PDF]

open access: yes, 2012
This paper presents differential-based distinguishers against ISO standard hash functions RIPEMD-128 and RIPEMD-160. The compression functions of RIPEMD-128/-160 adopt the double-branch structure, which updates a chaining variable by computing two ...
Lei Wang, Yu Sasaki
core  

Automating Collision Attacks on RIPEMD-160 [PDF]

open access: yes
As an ISO/IEC standard, the hash function RIPEMD-160 has been used to generate the Bitcoin address with SHA-256. However, due to the complex double-branch structure of RIPEMD-160, the best collision attack only reaches 36 out of 80 steps of RIPEMD-160 ...
Fukang Liu, Gaoli Wang, Yingxin Li
core  

Home - About - Disclaimer - Privacy