Results 251 to 260 of about 153,790 (328)

Secure Hash Algorithm based on Efficient Chaotic Neural Network

2016 International Conference on Communications (COMM), 2016
Secure Hash Algorithm (SHA) is the most popularstandard of Hash functions. Several security protocols useSHA to provide message integrity, authentication and digitalsignature. Nowadays, a new technology based on Chaotic NeuralNetwork is used to design Hash functions due to the followingimportant properties of Neural Networks: non-linearity,compression,
Abdoun, Nabil   +5 more
openaire   +3 more sources

Implementation of Enhanced Secure Hash Algorithm Towards a Secured Web Portal

2019 IEEE 4th International Conference on Computer and Communication Systems (ICCCS), 2019
In this paper, the application of the enhanced secure hash algorithm-512 is implemented on web applications specifically in password hashing. In addition to the enhancement of hash function, hill cipher is included for the salt generation to increase the complexity of generating hash tables that may be used as an attack on the algorithm. The testing of
Froilan E. De Guzman   +2 more
openaire   +2 more sources

Design and Analysis of Hash Algorithm Using Autonomous Initial Value Proposed Secure Hash Algorithm64

IEEE India Conference, 2021
A secure hash code or message authentication code is a one-way hash algorithm. It is producing a fixed-size hash function to be used to check verification, the integrity of electronic data, password storage.
B. Ambedkar, P. Bharti, Akhtar Husain
semanticscholar   +1 more source

Comparative Analysis of Password Storage Security using Double Secure Hash Algorithm

2022 IEEE North Karnataka Subsection Flagship International Conference (NKCon), 2022
Passwords are generally used to keep unauthorized users out of the system. Password hacking has become more common as the number of internet users has extended, causing a slew of issues.
Savarala Chethana   +4 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy