Results 11 to 20 of about 339,481 (270)
Instruction sequence expressions for the secure hash algorithm SHA-256
The secure hash function SHA-256 is a function on bit strings. This means that its restriction to the bit strings of any given length can be computed by a finite instruction sequence that contains only instructions to set and get the content of Boolean registers, forward jump instructions, and a termination instruction.
J.A. Bergstra, C.A. Middelburg
openalex +5 more sources
Integrity Authentication Based on Blockchain and Perceptual Hash for Remote-Sensing Imagery
The integrity of remote-sensing image data is susceptible to corruption during storage and transmission. Perceptual hashing is a non-destructive data integrity-protection technique suitable for high-accuracy requirements of remote-sensing image data ...
Dingjie Xu, Na Ren, Changqing Zhu
doaj +1 more source
In a mobile ad hoc network (MANET), all nodes are communicated with one another across wireless networks to create a temporary network without the support of centralised management. Due to dynamic topology in MANET, secure routing is a crucial issue. The
Anita R. Patil, Gautam M. Borkar
doaj +1 more source
Implementation of a Secure Storage Using Blockchain for PCA-FRF Sensor Data of Plate-Like Structures
Structural Health Monitoring (SHM) systems have widely been used to guarantee the safe functioning of electrical, mechanical, civil, and aerospace engineering assets.
Meisam Gordan+5 more
doaj +1 more source
Abstract A class of adamantane‐like molecular materials attracts attention because they exhibit an extreme non‐linear optical response and emit a broad white‐light spectrum after illumination with a continuous‐wave infrared laser source. According to recent studies, not only the nature of the cluster molecules, but also the macroscopic structure of the
Sebastian Schwan+7 more
wiley +1 more source
Abstract Considering the space‐time adaptive method for parabolic evolution equations we introduced in Stevenson et al., this work discusses an implementation of the method in which every step is of linear complexity. Exploiting the tensor‐product structure of the space‐time cylinder, the method allows for a family of trial spaces given as spans of ...
Raymond van Venetië, Jan Westerdiep
wiley +1 more source
Blockchain and cloud computing-based secure electronic healthcare records storage and sharing
Healthcare information is essential for both service providers and patients. Further secure sharing and maintenance of Electronic Healthcare Records (EHR) are imperative.
Amna Amanat+6 more
doaj +1 more source
An Improved Fast and Secure Hash Algorithm [PDF]
Abstract —Recently, a fast and secure hash function SFHA – 256 has been proposed and claimed as more secure and as having a better performance than the SHA – 256. In this paper an improved version of SFHA – 256 is proposed and analyzed using two parameters, namely the avalanche effect and uniform deviation. The experimental results and further analysis
Abhinav Rungta+4 more
openaire +2 more sources
High Throughput Implementation of the Keccak Hash Function Using the Nios-II Processor
Presently, cryptographic hash functions play a critical role in many applications, such as digital signature systems, security communications, protocols, and network security infrastructures.
Argyrios Sideris+2 more
doaj +1 more source
Semantic-Aware Adversarial Training for Reliable Deep Hashing Retrieval [PDF]
Deep hashing has been intensively studied and successfully applied in large-scale image retrieval systems due to its efficiency and effectiveness. Recent studies have recognized that the existence of adversarial examples poses a security threat to deep hashing models, that is, adversarial vulnerability. Notably, it is challenging to efficiently distill
arxiv +1 more source