Results 271 to 280 of about 153,790 (328)
Some of the next articles are maybe not open access.

Hash Algorithms and Security Applications

2003
The security services required to guarantee a fully protected networking system are [76, 29]: Confidentiality - protecting the data from disclosure to unauthorised bodies Authentication - assuring that received data was indeed transmitted by the body identified as the source Integrity - maintaining data consistency and ensuring that ...
Máire McLoone, John V. McCanny
openaire   +1 more source

Secure OFDM communications based on hashing algorithms

SPIE Proceedings, 2007
In this paper we propose an OFDM (Orthogonal Frequency Division Multiplexing) wireless communication system that introduces mutual authentication and encryption at the physical layer, without impairing spectral efficiency, exploiting some freedom degrees of the base-band signal, and using encrypted-hash algorithms.
NERI, Alessandro   +2 more
openaire   +1 more source

Design of Hash Algorithm for Blockchain Security

2022
Blockchain is the invention that permits digitally generated information to be allocated without being copied. Blockchain technology is the heart of the new internet (i.e., virtual currency). Emerging clever settlement structures over decentralized cryptocurrencies permit jointly suspicious events to transact competently without relying on third ...
openaire   +1 more source

A Comparative Study of Secure Hash Algorithms

2016
Important responsibility of every organization is to provide an adequate security and confidentiality to its electronic data system. Data should be protected during transmission or while in storage it is necessary to maintain the integrity and confidentiality of the information represented by the original data.
Smriti Gupta   +3 more
openaire   +1 more source

Security and Robustness Enhancement of Existing Hash Algorithm

2009 International Conference on Signal Processing Systems, 2009
In wireless communication for data integrity hash functions are commonly used. It is also an important cryptographic primitives, which is very critical for data integrity assurance and data origin authentication in security services. SHA hash functions are set of cryptographic hash function designed by NSA.
Thulasmani Lakshmanan, M. Madheswaran
openaire   +1 more source

Brief review on journey of secured hash algorithms

2017 4th International Conference on Opto-Electronics and Applied Optics (Optronix), 2017
A detailed review of a brief history, applications and contributions of the hash functions in today's cryptology are articulated here. The secured hash functions are applied in various fields to provide a secure data transfer and authentication of messages and other user linked information through a series of algorithms.
Santanu Debnath   +2 more
openaire   +1 more source

Hash Based Message Authentication Code Performance with Different Secure Hash Functions

International Computer Science Conference
Hash-based Message Authentication Code (HMAC) is a widely used cryptographic algorithm that combines a hash function with a secret key to ensure the integrity and authenticity of data. The performance of HMAC relies on the underlying hash function.
Ankush Soni   +2 more
semanticscholar   +1 more source

Secure hash algorithms

With the significance of data security increasing, hashing has become a vital part of both the computer sciences and mathematical research. Even though the first secure hashing algorithm has been defined by NIST decades ago, research on the field of secure hashing algorithms is now more relevant than ever. However, the choice of which security level to
openaire   +1 more source

SECURE FILES USING SECURE HASH ALGORITHM AND ELLIPTICAL CURVE CRYPTOGRAPHY

International Journal on Science and Technology
Protecting sensitive files requires robust cryptographic mechanisms that ensure confidentiality while maintaining efficiency.
B. Prashanth -   +3 more
openaire   +1 more source

Home - About - Disclaimer - Privacy