Results 251 to 260 of about 147,726 (298)
Some of the next articles are maybe not open access.

Hash Algorithms and Security Applications

2003
The security services required to guarantee a fully protected networking system are [76, 29]: Confidentiality - protecting the data from disclosure to unauthorised bodies Authentication - assuring that received data was indeed transmitted by the body identified as the source Integrity - maintaining data consistency and ensuring that ...
John V. McCanny, Maire Patricia Mcloone
openaire   +2 more sources

A Reconfigurable Implementation of the New Secure Hash Algorithm

The Second International Conference on Availability, Reliability and Security (ARES'07), 2007
The main applications of the hash functions are met in the fields of communication's integrity and signature authentication. Many hash algorithms have been investigated and developed in the last years. This work is related to hash functions FPGA implementation.
Medien Zeghid   +4 more
openaire   +2 more sources

Enhanced Visual Cryptosystem Using BLAKE2 Hash Algorithm

2023 IEEE International Conference on Industry 4.0, Artificial Intelligence, and Communications Technology (IAICT), 2023
Many physical devices in everyday life have been connected to the global web since its inception. The network’s security improves as the number of items connected to it grows. However, current security measures make progress difficult. As a result, based
A.J. Bhuvaneshwari, P. Kaythry
semanticscholar   +1 more source

A Comparative Study of Secure Hash Algorithms

2016
Important responsibility of every organization is to provide an adequate security and confidentiality to its electronic data system. Data should be protected during transmission or while in storage it is necessary to maintain the integrity and confidentiality of the information represented by the original data.
Sandeep Kumar Yadav   +3 more
openaire   +2 more sources

Secure Hash Algorithms and the Corresponding FPGA Optimization Techniques

ACM Computing Surveys, 2020
Cryptographic hash functions are widely used primitives with a purpose to ensure the integrity of data. Hash functions are also utilized in conjunction with digital signatures to provide authentication and non-repudiation services. The SHA has been developed over time by the National Institute of Standards and Technology for security, optimal ...
Zeyad Al-Odat   +3 more
openaire   +1 more source

A novel image encryption scheme using chaos, hyper-chaos systems and the secure Hash algorithm SHA-1

International Conference on Computer Aided Design, 2017
In this paper, we introduce a fast, secure and robust scheme for digital image encryption using chaotic system of Lorenz, 4D hyper-chaotic system and the Secure Hash Algorithm SHA-1.
N. B. Slimane   +2 more
semanticscholar   +1 more source

A new secure and fast hashing algorithm (SFHA-256)

2008 National Radio Science Conference, 2008
This paper presents a new secure and fast hashing algorithm based on the generic 3C construction. This construction is obtained by modifying the Merkle-Damgard (M-D) iterated construction used to construct iterated hash functions arid it is more resistant against the recent differential multi-blocks attacks and the extension attacks than the M-D ...
Mohamed E. Nasr   +2 more
openaire   +2 more sources

Robustness and security of a wavelet-based CBIR hashing algorithm

Proceedings of the 8th workshop on Multimedia and security, 2006
A wavelet-based robust database hashing scheme is analyzed with respect to its resilience against image modifications and hostile attacks. A method to construct a forgery is presented and possible countermeasures are discussed.
Albert Meixner, Andreas Uhl
openaire   +2 more sources

Investigating the Utilization of the Secure Hash Algorithm to Generate Electromagnetic Noise

Proceedings of the 9th International Conference on Signal Processing Systems, 2017
This research introduces an electromagnetic (EM) noise generator known as the FRIES noise generator to mitigate and obfuscate Side Channel Analysis (SCA) attacks against a Raspberry Pi. The FRIES noise generator utilizes the implementation of the Secure Hash Algorithm (SHA) from OpenSSL to generate white noise within the EM spectrum.
Frieslaar, Ibraheem, Irwin, Barry V W
openaire   +3 more sources

Visualizing Secure Hash Algorithm (SHA-1) on the Web

2011
Cryptographic hash functions play an important role in modern cryptography. In this paper, we present web-based interactive visualization applets for teaching secure hash algorithm (SHA-1). The visualization applets lead to more efficient learning outcomes.
Dalia B. Nasr   +2 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy