Results 271 to 280 of about 153,790 (328)
Some of the next articles are maybe not open access.
Hash Algorithms and Security Applications
2003The security services required to guarantee a fully protected networking system are [76, 29]: Confidentiality - protecting the data from disclosure to unauthorised bodies Authentication - assuring that received data was indeed transmitted by the body identified as the source Integrity - maintaining data consistency and ensuring that ...
Máire McLoone, John V. McCanny
openaire +1 more source
Secure OFDM communications based on hashing algorithms
SPIE Proceedings, 2007In this paper we propose an OFDM (Orthogonal Frequency Division Multiplexing) wireless communication system that introduces mutual authentication and encryption at the physical layer, without impairing spectral efficiency, exploiting some freedom degrees of the base-band signal, and using encrypted-hash algorithms.
NERI, Alessandro +2 more
openaire +1 more source
Design of Hash Algorithm for Blockchain Security
2022Blockchain is the invention that permits digitally generated information to be allocated without being copied. Blockchain technology is the heart of the new internet (i.e., virtual currency). Emerging clever settlement structures over decentralized cryptocurrencies permit jointly suspicious events to transact competently without relying on third ...
openaire +1 more source
A Comparative Study of Secure Hash Algorithms
2016Important responsibility of every organization is to provide an adequate security and confidentiality to its electronic data system. Data should be protected during transmission or while in storage it is necessary to maintain the integrity and confidentiality of the information represented by the original data.
Smriti Gupta +3 more
openaire +1 more source
Security and Robustness Enhancement of Existing Hash Algorithm
2009 International Conference on Signal Processing Systems, 2009In wireless communication for data integrity hash functions are commonly used. It is also an important cryptographic primitives, which is very critical for data integrity assurance and data origin authentication in security services. SHA hash functions are set of cryptographic hash function designed by NSA.
Thulasmani Lakshmanan, M. Madheswaran
openaire +1 more source
Brief review on journey of secured hash algorithms
2017 4th International Conference on Opto-Electronics and Applied Optics (Optronix), 2017A detailed review of a brief history, applications and contributions of the hash functions in today's cryptology are articulated here. The secured hash functions are applied in various fields to provide a secure data transfer and authentication of messages and other user linked information through a series of algorithms.
Santanu Debnath +2 more
openaire +1 more source
Hash Based Message Authentication Code Performance with Different Secure Hash Functions
International Computer Science ConferenceHash-based Message Authentication Code (HMAC) is a widely used cryptographic algorithm that combines a hash function with a secret key to ensure the integrity and authenticity of data. The performance of HMAC relies on the underlying hash function.
Ankush Soni +2 more
semanticscholar +1 more source
With the significance of data security increasing, hashing has become a vital part of both the computer sciences and mathematical research. Even though the first secure hashing algorithm has been defined by NIST decades ago, research on the field of secure hashing algorithms is now more relevant than ever. However, the choice of which security level to
openaire +1 more source
openaire +1 more source
SECURE FILES USING SECURE HASH ALGORITHM AND ELLIPTICAL CURVE CRYPTOGRAPHY
International Journal on Science and TechnologyProtecting sensitive files requires robust cryptographic mechanisms that ensure confidentiality while maintaining efficiency.
B. Prashanth - +3 more
openaire +1 more source

