Results 241 to 250 of about 142,210 (279)
Some of the next articles are maybe not open access.
OSHA: A General-purpose and Next Generation One-way Secure Hash Algorithm
International Conference on Interaction Sciences, 2022Secure hash functions are widely used in cryptographic algorithms to secure against diverse attacks. A one-way secure hash function is used in the various research fields to secure, for instance, blockchain.
Ripon Patgiri
semanticscholar +1 more source
IEEE India Conference, 2021
A secure hash code or message authentication code is a one-way hash algorithm. It is producing a fixed-size hash function to be used to check verification, the integrity of electronic data, password storage.
B. Ambedkar, P. Bharti, Akhtar Husain
semanticscholar +1 more source
A secure hash code or message authentication code is a one-way hash algorithm. It is producing a fixed-size hash function to be used to check verification, the integrity of electronic data, password storage.
B. Ambedkar, P. Bharti, Akhtar Husain
semanticscholar +1 more source
Comparative Analysis of Password Storage Security using Double Secure Hash Algorithm
2022 IEEE North Karnataka Subsection Flagship International Conference (NKCon), 2022Passwords are generally used to keep unauthorized users out of the system. Password hacking has become more common as the number of internet users has extended, causing a slew of issues.
Savarala Chethana+4 more
semanticscholar +1 more source
Acceleration of the Secure Hash Algorithm-256 (SHA-256) on an FPGA-CPU Cluster Using OpenCL
International Symposium on Circuits and Systems, 2021The Secure Hash Algorithm-256 (SHA-256) is a cryptographic function used in a wide variety of applications ranging from Internet of Things micro-devices to highperformance systems.
Hachem Bensalem+2 more
semanticscholar +1 more source
Enhance Neighbor Discovery Protocol Security by Using Secure Hash Algorithm
International Conference on Intelligent Computing, 2021Neighbor Discovery Protocol (NDP) plays a vital role in IPv6. Neighbor Solicitation (NS) and Neighbor Advertisement (NA) are two important messages of NDP.
Muhammad Usman+5 more
semanticscholar +1 more source
, 2021
The development of the Web as a highly integrated user interface to real link things has brought many challenges and problems to study, which has led to a rapidly increasing area of research called the Web of things (WoT).
Hayder Najm
semanticscholar +1 more source
The development of the Web as a highly integrated user interface to real link things has brought many challenges and problems to study, which has led to a rapidly increasing area of research called the Web of things (WoT).
Hayder Najm
semanticscholar +1 more source
Brief review on journey of secured hash algorithms [PDF]
A detailed review of a brief history, applications and contributions of the hash functions in today's cryptology are articulated here. The secured hash functions are applied in various fields to provide a secure data transfer and authentication of messages and other user linked information through a series of algorithms.
Santanu Debnath+2 more
openaire +1 more source
EVOLUTION AND ANALYSIS OF SECURED HASH ALGORITHM (SHA) FAMILY
Malaysian Journal of Computer Science, 2022With the rapid advancement of technologies and proliferation of intelligent devices, connecting to the internet challenges have grown manifold, such as ensuring communication security and keeping user credentials secret. Data integrity and user privacy have become crucial concerns in any ecosystem of advanced and interconnected communications ...
Khan, Burhan Ul Islam+5 more
openaire +2 more sources
Secure OFDM communications based on hashing algorithms
SPIE Proceedings, 2007In this paper we propose an OFDM (Orthogonal Frequency Division Multiplexing) wireless communication system that introduces mutual authentication and encryption at the physical layer, without impairing spectral efficiency, exploiting some freedom degrees of the base-band signal, and using encrypted-hash algorithms.
NERI, Alessandro+2 more
openaire +2 more sources
Security and Robustness Enhancement of Existing Hash Algorithm
2009 International Conference on Signal Processing Systems, 2009In wireless communication for data integrity hash functions are commonly used. It is also an important cryptographic primitives, which is very critical for data integrity assurance and data origin authentication in security services. SHA hash functions are set of cryptographic hash function designed by NSA.
Thulasmani Lakshmanan, M. Madheswaran
openaire +2 more sources