Results 11 to 20 of about 142,210 (279)

On Information Integrity Measurement with Secure Hash Algorithm (SHA) [PDF]

open access: bronzeInSITE Conference, 2015
The “information age” as often referred to the modern society, has become heavily dependent on information systems. As this dependency increases, the threat to information security has also gained ground. Societies need to cater for the security of information, and this has led to the development of different information security techniques most ...
Segun Adebisi Ojo   +3 more
openalex   +3 more sources

Performance and Limitation Review of Secure Hash Function Algorithm

open access: bronzeInternational Journal on Recent and Innovation Trends in Computing and Communication, 2019
A cryptographic hash work is a phenomenal class of hash work that has certain properties which make it fitting for use in cryptography. It is a numerical figuring that maps information of emotional size to a bit string of a settled size (a hash) and is expected to be a confined limit, that is, a limit which is infeasible to adjust.
Iti Malviya, Tejasvini Chetty
openalex   +3 more sources

Implementasi Secure Hash Algorithm-1 Untuk Pengamanan Data Dalam Library Pada Pemrograman Java

open access: hybrid, 2015
Masalah Keamanan merupakan salah satu aspek penting dari sistem informasi. Begitu pentingnya nilai informasi menyebabkan seringkali informasi diinginkan oleh orang tertentu kemudian dapat memodifikasi informasi tersebut. Untuk dapat mengesahkan informasi
Komang Aryasa, Yesaya Tommy Paulus
openalex   +3 more sources

Enhanced image hash using cellular automata with sponge construction and elliptic curve cryptography for secure image transaction [PDF]

open access: yesScientific Reports
With the rapid development of digital communications, sensitive digital storage security, especially that of images, remains a significant challenge.
M. Mohammed Ibrahim   +6 more
doaj   +2 more sources

Data De-Duplication Using SHA (Secure Hash Algorithm)

open access: goldInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology, 2019
Now-a-days the number of users using cloud storage has increased so that the data stored has been increased in exponential rates. The data should be secured and the storage should be used efficiently. But a lot of duplicate data is present as two or more users may upload the same data.
G. Kalyani, D.S.L. Neethika, Ch. Jayasri
openalex   +3 more sources

A secured Cryptographic Hashing Algorithm

open access: green, 2010
Cryptographic hash functions for calculating the message digest of a message has been in practical use as an effective measure to maintain message integrity since a few decades. This message digest is unique, irreversible and avoids all types of collisions for any given input string.
Rakesh Mohanty   +2 more
openalex   +4 more sources

CASH: A Cost Asymmetric Secure Hash Algorithm for Optimal Password Protection [PDF]

open access: yes2016 IEEE 29th Computer Security Foundations Symposium (CSF), 2016
An adversary who has obtained the cryptographic hash of a user's password can mount an offline attack to crack the password by comparing this hash value with the cryptographic hashes of likely password guesses. This offline attacker is limited only by the resources he is willing to invest to crack the password.
Jeremiah Blocki, Anupam Datta
openaire   +5 more sources

Secure Hash Algorithm-3(SHA-3) implementation on Xilinx FPGAs, Suitable for IoT Applications [PDF]

open access: goldInternational Journal on Smart Sensing and Intelligent Systems, 2014
Data integrity is a term used when referring to the accuracy and reliability of data. It ensures that data is not altered during operations, such as transfer, storage, or retrieval.
Muzaffar Rao, Thomas Newe, Ian Grout
openalex   +2 more sources

Design and Implementation of a Strong and Secure Lightweight Cryptographic Hash Algorithm using Elliptic Curve Concept: SSLHA-160 [PDF]

open access: gold, 2021
Cryptographic hash function assumes a fundamental job in numerous pieces of cryptographic algorithm and conventions, particularly in authentication, non-repudiation and information trustworthiness administrations.
Bhaskar Prakash Kosta, Pasala Sanyasi
openalex   +2 more sources

Pengkodean Pesan Teks Dengan Proses Penerapan Algoritma Kriptografi Secure Hash Algorithm (SHA)

open access: bronzeJurnal Informatika Kaputama (JIK), 2017
Masalah Keamanan merupakan salah satu aspek penting dari sistem informasi. Begitu pentingnya nilai informasi menyebabkan seringkali informasi diinginkan oleh orang tertentu kemudian dapat memodifikasi informasi tersebut. Untuk dapat mengesahkan informasi
Romanus Damanik
openalex   +3 more sources

Home - About - Disclaimer - Privacy