Results 251 to 260 of about 147,726 (298)
Some of the next articles are maybe not open access.
Hash Algorithms and Security Applications
2003The security services required to guarantee a fully protected networking system are [76, 29]: Confidentiality - protecting the data from disclosure to unauthorised bodies Authentication - assuring that received data was indeed transmitted by the body identified as the source Integrity - maintaining data consistency and ensuring that ...
John V. McCanny, Maire Patricia Mcloone
openaire +2 more sources
A Reconfigurable Implementation of the New Secure Hash Algorithm
The Second International Conference on Availability, Reliability and Security (ARES'07), 2007The main applications of the hash functions are met in the fields of communication's integrity and signature authentication. Many hash algorithms have been investigated and developed in the last years. This work is related to hash functions FPGA implementation.
Medien Zeghid +4 more
openaire +2 more sources
Enhanced Visual Cryptosystem Using BLAKE2 Hash Algorithm
2023 IEEE International Conference on Industry 4.0, Artificial Intelligence, and Communications Technology (IAICT), 2023Many physical devices in everyday life have been connected to the global web since its inception. The network’s security improves as the number of items connected to it grows. However, current security measures make progress difficult. As a result, based
A.J. Bhuvaneshwari, P. Kaythry
semanticscholar +1 more source
A Comparative Study of Secure Hash Algorithms
2016Important responsibility of every organization is to provide an adequate security and confidentiality to its electronic data system. Data should be protected during transmission or while in storage it is necessary to maintain the integrity and confidentiality of the information represented by the original data.
Sandeep Kumar Yadav +3 more
openaire +2 more sources
Secure Hash Algorithms and the Corresponding FPGA Optimization Techniques
ACM Computing Surveys, 2020Cryptographic hash functions are widely used primitives with a purpose to ensure the integrity of data. Hash functions are also utilized in conjunction with digital signatures to provide authentication and non-repudiation services. The SHA has been developed over time by the National Institute of Standards and Technology for security, optimal ...
Zeyad Al-Odat +3 more
openaire +1 more source
A novel image encryption scheme using chaos, hyper-chaos systems and the secure Hash algorithm SHA-1
International Conference on Computer Aided Design, 2017In this paper, we introduce a fast, secure and robust scheme for digital image encryption using chaotic system of Lorenz, 4D hyper-chaotic system and the Secure Hash Algorithm SHA-1.
N. B. Slimane +2 more
semanticscholar +1 more source
A new secure and fast hashing algorithm (SFHA-256)
2008 National Radio Science Conference, 2008This paper presents a new secure and fast hashing algorithm based on the generic 3C construction. This construction is obtained by modifying the Merkle-Damgard (M-D) iterated construction used to construct iterated hash functions arid it is more resistant against the recent differential multi-blocks attacks and the extension attacks than the M-D ...
Mohamed E. Nasr +2 more
openaire +2 more sources
Robustness and security of a wavelet-based CBIR hashing algorithm
Proceedings of the 8th workshop on Multimedia and security, 2006A wavelet-based robust database hashing scheme is analyzed with respect to its resilience against image modifications and hostile attacks. A method to construct a forgery is presented and possible countermeasures are discussed.
Albert Meixner, Andreas Uhl
openaire +2 more sources
Investigating the Utilization of the Secure Hash Algorithm to Generate Electromagnetic Noise
Proceedings of the 9th International Conference on Signal Processing Systems, 2017This research introduces an electromagnetic (EM) noise generator known as the FRIES noise generator to mitigate and obfuscate Side Channel Analysis (SCA) attacks against a Raspberry Pi. The FRIES noise generator utilizes the implementation of the Secure Hash Algorithm (SHA) from OpenSSL to generate white noise within the EM spectrum.
Frieslaar, Ibraheem, Irwin, Barry V W
openaire +3 more sources
Visualizing Secure Hash Algorithm (SHA-1) on the Web
2011Cryptographic hash functions play an important role in modern cryptography. In this paper, we present web-based interactive visualization applets for teaching secure hash algorithm (SHA-1). The visualization applets lead to more efficient learning outcomes.
Dalia B. Nasr +2 more
openaire +2 more sources

