Results 91 to 100 of about 142,210 (279)
Steganography in Color Animated Image Sequence for Secret Data Sharing Using Secure Hash Algorithm [PDF]
Ratan Kumar Basak+3 more
openalex +2 more sources
S-GoSV: Framework for Generating Secure IEC 61850 GOOSE and Sample Value Messages
Standardized communication plays an important role in substation automation system (SAS). IEC 61850 is a de-facto standard in SAS. It facilitates smooth communication between different devices located in the substation by achieving interoperability ...
Shaik Mullapathi Farooq+2 more
doaj +1 more source
Penelitian ini mempelajari bagaimana kriptografi menggunakan Secure Hash Algorthm 256 (SHA-256) dan Rivest Shamir Adleman (RSA) untuk menjaga keaslian Surat Keterangan Lulus (SKL) dengan menggunakan kode Quick Response (QR) berbasis web.
Juniar Hutagalung+2 more
doaj +1 more source
Quantum attacks on Bitcoin, and how to protect against them [PDF]
The key cryptographic protocols used to secure the internet and financial transactions of today are all susceptible to attack by the development of a sufficiently large quantum computer.
Aggarwal, Divesh+4 more
core +3 more sources
ABSTRACT Assuring environmental sustainability is essential for the continuity of the ecosystem. Every sector of the economy has some degree of impact on environmental sustainability. The United Nations (UN)’ Sustainable Development Goals (SDGs) have placed these objectives within a broader global framework, offering a global plan aimed at ensuring ...
Ali Çelik, Metehan Özırmak
wiley +1 more source
Fast Implementation of SHA-3 in GPU Environment
Recently, Graphic Processing Units (GPUs) have been widely used for general purpose applications such as machine learning applications, acceleration of cryptographic applications (especially, blockchains), etc.
Hojin Choi, Seog Chung Seo
doaj +1 more source
An Analysis and Enumeration of the Blockchain and Future Implications [PDF]
The blockchain is a relatively new technology that has grown in interest and potential research since its inception. Blockchain technology is dominated by cryptocurrency in terms of usage.
LeBlanc, Nathanial
core +1 more source
ABSTRACT Background Low Earth Orbit (LEO) satellite constellations are redefining the concept of global connectivity, opening up a new world of opportunities for communication services and applications. Purpose The emergence of LEO satellites (SATs) is ushering in a new era of innovation, where new complex technologies are being developed, and the use ...
Pilar Manzanares‐Lopez+2 more
wiley +1 more source
Short signature based on factoring problem in the standard model
A short signature scheme based on factoring problem in the standard model was proposed.To design this sig-nature scheme,the generic construction of fully-secure signatures from weakly-secure signatures and a chameleon hash were employed.A signature in ...
WANG Zhi-wei1, ZHANG Wei1
doaj +2 more sources
Security Analysis of Speech Perceptual Hashing Authentication Algorithm
Speech perceptual hashing authentication algorithm is an efficient method for content integrity authentication and identity authentication. But the algorithm becomes transparent under the principle of Kerckhoffs which makes the algorithm unsafe. In this paper, the algorithm is encrypted under the principle of Kerckhoffs to protect the security of the ...
Ren Zhan-wei+4 more
openaire +1 more source