Results 261 to 270 of about 153,790 (328)
Some of the next articles are maybe not open access.

Enhancing the Performance of Hash Function Using Autonomous Initial Value Proposed Secure Hash Algorithm 256

International Conference on Communication Systems and Network Technologies, 2022
To verify the integrity and confidentiality of data communicated through the web is a very big issue worldwide because every person wants very fast computing and secure electronic data communication via the web.
B. Ambedkar, P. Bharti, Akhtar Husain
semanticscholar   +1 more source

Implementation of Rail Fence Cipher and Myszkowski Algorithms and Secure Hash Algorithm (SHA-256) for Security and Detecting Digital Image Originality

2022 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS), 2022
The use of digital images is increasingly widespread currently. There is a need for security in digital photos. Cryptography is a technique that can be applied to secure data.
Rojali   +2 more
semanticscholar   +1 more source

OSHA: A General-purpose and Next Generation One-way Secure Hash Algorithm

International Conference on Interaction Sciences, 2022
Secure hash functions are widely used in cryptographic algorithms to secure against diverse attacks. A one-way secure hash function is used in the various research fields to secure, for instance, blockchain.
Ripon Patgiri
semanticscholar   +1 more source

Acceleration of the Secure Hash Algorithm-256 (SHA-256) on an FPGA-CPU Cluster Using OpenCL

International Symposium on Circuits and Systems, 2021
The Secure Hash Algorithm-256 (SHA-256) is a cryptographic function used in a wide variety of applications ranging from Internet of Things micro-devices to highperformance systems.
Hachem Bensalem   +2 more
semanticscholar   +1 more source

Implement Time Based One Time Password and Secure Hash Algorithm 1 for Security of Website Login Authentication

2019 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS), 2019
The use of information systems is a solutions to support the operations of the institution. In order to access information systems in accordance with their access rights, usually the user will enter a username and password as the authentication process ...
H. Seta   +2 more
semanticscholar   +1 more source

Penerapan Algoritma Secure Hash Algorithm (SHA) Keamanan Pada Citra

MEANS (Media Informasi Analisa dan Sistem), 2019
Current information exchange is not only in the form of text, it can be an image or video. All of that can be done using computer network technology in the form of the internet.
Hermansyah Sembiring   +2 more
semanticscholar   +1 more source

Generalized secure hash algorithm: SHA-X

2011 IEEE EUROCON - International Conference on Computer as a Tool, 2011
This paper defines a generalized SHA algorithm based on the SHA family rules. The proposed algorithm accepts arbitrary length message as input to generate message digest with the required length. It contains the initial values, constant values, padding, parsing, as well as the generalized main body.
null Chu-Hsing Lin   +4 more
openaire   +1 more source

Enhanced Visual Cryptosystem Using BLAKE2 Hash Algorithm

2023 IEEE International Conference on Industry 4.0, Artificial Intelligence, and Communications Technology (IAICT), 2023
Many physical devices in everyday life have been connected to the global web since its inception. The network’s security improves as the number of items connected to it grows. However, current security measures make progress difficult. As a result, based
A.J. Bhuvaneshwari, P. Kaythry
semanticscholar   +1 more source

A novel image encryption scheme using chaos, hyper-chaos systems and the secure Hash algorithm SHA-1

International Conference on Computer Aided Design, 2017
In this paper, we introduce a fast, secure and robust scheme for digital image encryption using chaotic system of Lorenz, 4D hyper-chaotic system and the Secure Hash Algorithm SHA-1.
N. B. Slimane   +2 more
semanticscholar   +1 more source

Enhanced Secure Hash Algorithm-512 based on Quadratic Function

International Conference on Humanoid, Nanotechnology, Information Technology,Communication and Control, Environment and Management, 2018
This paper attempts to introduce the enhanced SHA-1 algorithm which features a simple quadratic function that will control the selection of primitive function and constant used per round of SHA-1.
Froilan E. de Guzman   +2 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy