Results 251 to 260 of about 142,210 (279)
Some of the next articles are maybe not open access.

Generalized secure hash algorithm: SHA-X

2011 IEEE EUROCON - International Conference on Computer as a Tool, 2011
This paper defines a generalized SHA algorithm based on the SHA family rules. The proposed algorithm accepts arbitrary length message as input to generate message digest with the required length. It contains the initial values, constant values, padding, parsing, as well as the generalized main body.
Yi-Shiung Yeh   +4 more
openaire   +2 more sources

Implement Time Based One Time Password and Secure Hash Algorithm 1 for Security of Website Login Authentication

2019 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS), 2019
The use of information systems is a solutions to support the operations of the institution. In order to access information systems in accordance with their access rights, usually the user will enter a username and password as the authentication process ...
H. Seta   +2 more
semanticscholar   +1 more source

Enhanced Visual Cryptosystem Using BLAKE2 Hash Algorithm

2023 IEEE International Conference on Industry 4.0, Artificial Intelligence, and Communications Technology (IAICT), 2023
Many physical devices in everyday life have been connected to the global web since its inception. The network’s security improves as the number of items connected to it grows. However, current security measures make progress difficult. As a result, based
A.J. Bhuvaneshwari, P. Kaythry
semanticscholar   +1 more source

Hash Algorithms and Security Applications

2003
The security services required to guarantee a fully protected networking system are [76, 29]: Confidentiality - protecting the data from disclosure to unauthorised bodies Authentication - assuring that received data was indeed transmitted by the body identified as the source Integrity - maintaining data consistency and ensuring that ...
John V. McCanny, Maire Patricia Mcloone
openaire   +2 more sources

A Reconfigurable Implementation of the New Secure Hash Algorithm

The Second International Conference on Availability, Reliability and Security (ARES'07), 2007
The main applications of the hash functions are met in the fields of communication's integrity and signature authentication. Many hash algorithms have been investigated and developed in the last years. This work is related to hash functions FPGA implementation.
Medien Zeghid   +4 more
openaire   +2 more sources

Secure Hash Algorithms and the Corresponding FPGA Optimization Techniques

ACM Computing Surveys, 2020
Cryptographic hash functions are widely used primitives with a purpose to ensure the integrity of data. Hash functions are also utilized in conjunction with digital signatures to provide authentication and non-repudiation services. The SHA has been developed over time by the National Institute of Standards and Technology for security, optimal ...
Zeyad Al-Odat   +3 more
openaire   +1 more source

A Comparative Study of Secure Hash Algorithms

2016
Important responsibility of every organization is to provide an adequate security and confidentiality to its electronic data system. Data should be protected during transmission or while in storage it is necessary to maintain the integrity and confidentiality of the information represented by the original data.
Sandeep Kumar Yadav   +3 more
openaire   +2 more sources

A novel image encryption scheme using chaos, hyper-chaos systems and the secure Hash algorithm SHA-1

International Conference on Computer Aided Design, 2017
In this paper, we introduce a fast, secure and robust scheme for digital image encryption using chaotic system of Lorenz, 4D hyper-chaotic system and the Secure Hash Algorithm SHA-1.
N. B. Slimane   +2 more
semanticscholar   +1 more source

A new secure and fast hashing algorithm (SFHA-256)

2008 National Radio Science Conference, 2008
This paper presents a new secure and fast hashing algorithm based on the generic 3C construction. This construction is obtained by modifying the Merkle-Damgard (M-D) iterated construction used to construct iterated hash functions arid it is more resistant against the recent differential multi-blocks attacks and the extension attacks than the M-D ...
Mohamed E. Nasr   +2 more
openaire   +2 more sources

Robustness and security of a wavelet-based CBIR hashing algorithm

Proceedings of the 8th workshop on Multimedia and security, 2006
A wavelet-based robust database hashing scheme is analyzed with respect to its resilience against image modifications and hostile attacks. A method to construct a forgery is presented and possible countermeasures are discussed.
Albert Meixner, Andreas Uhl
openaire   +2 more sources

Home - About - Disclaimer - Privacy