An image encryption scheme using PRESENT-RC4, chaos and secure key generation. [PDF]
Kumar K, Roy S, Puri D, Kumar R.
europepmc +1 more source
Dynamic structure driven image scrambling technique for data protection. [PDF]
Shee SK, Khandelwal J, Bairwa AK.
europepmc +1 more source
Parallel Implementation of Lightweight Secure Hash Algorithm on CPU and GPU Environments [PDF]
Ho-Jin Choi +2 more
openalex +1 more source
Synchronizing LLM-based semantic knowledge bases via secure federated fine-tuning in semantic communication. [PDF]
Li L +6 more
europepmc +1 more source
Secure Cloud Computing using Blockchain with Verkle Tree Hash algorithm [PDF]
Imran Shahid Shaikh
openalex +1 more source
The Untapped Potential of Ascon Hash Functions: Benchmarking, Hardware Profiling, and Application Insights for Secure IoT and Blockchain Systems. [PDF]
Gladis Kurian M, Chen Y.
europepmc +1 more source
RTL Design, Verification and Synthesis of Secure Hash Algorithm to implement on an ASIC Processor
Akhilesh S Narayan +4 more
openalex +1 more source
Quantum secured blockchain framework for enhancing post quantum data security. [PDF]
Reddy NR +5 more
europepmc +1 more source
A Lightweight Privacy-Enhanced Federated Clustering Algorithm for Edge Computing. [PDF]
Wang J +5 more
europepmc +1 more source
Summarizing data for secure transaction: A hash algorithm
Hashing is a process of transforming a variable length data message into a fixed size message digest. Hashing algorithms are considered one-way functions, since the input cannot be determined from the message digests. As a security tool in data communication, hashing is used both for protecting data integrity and for authentication.
openaire +2 more sources

