Results 31 to 40 of about 52,632 (234)

Hash-based signatures for the internet of things [PDF]

open access: yes, 2018
While numerous digital signature schemes exist in the literature, most real-world system rely on RSA-based signature schemes or on the digital signature algorithm (DSA), including its elliptic curve cryptography variant ECDSA.
Hülsing A.   +4 more
core   +1 more source

A Secure Multi-Party Computation Protocol for Graph Editing Distance against Malicious Attacks

open access: yesMathematics, 2023
The secure computation of the graph structure is an important element in the field of secure calculation of graphs, which is important in querying data in graphs, since there are no algorithms for the graph edit distance problem that can resist attacks ...
Xin Liu   +6 more
doaj   +1 more source

An improved NFC device authentication protocol.

open access: yesPLoS ONE, 2021
Aimed at the security authentication problem between Near Field Communication (NFC) devices, this paper uses the technology of asymmetric encryption algorithm, symmetric encryption algorithm, hash function, timestamp and survival period to improve the ...
He-Jun Lu, Dui Liu
doaj   +1 more source

Random Oracles in a Quantum World [PDF]

open access: yes, 2011
The interest in post-quantum cryptography - classical systems that remain secure in the presence of a quantum adversary - has generated elegant proposals for new cryptosystems.
C.H. Bennett   +25 more
core   +3 more sources

Enhancing the Security of MANETs using Hash Algorithms

open access: yesProcedia Computer Science, 2015
AbstractHash functions are used in information security applications for the generation and verification of digital signatures, key derivation, and pseudorandom bit generation. Hash algorithms are secure because, for a given algorithm, it is computationally infeasible to find a message that corresponds to a given message digest, or to find two ...
Dilli Ravilla   +1 more
openaire   +2 more sources

Chameleon: a Blind Double Trapdoor Hash Function for Securing AMI Data Aggregation [PDF]

open access: yes, 2018
Data aggregation is an integral part of Advanced Metering Infrastructure (AMI) deployment that is implemented by the concentrator. Data aggregation reduces the number of transmissions, thereby reducing communication costs and increasing the bandwidth ...
Keoh, Sye Loong   +5 more
core   +1 more source

Secure and Fast Hashing Algorithm with Multiple Security Levels

open access: yesJournal of Software, 2009
We propose a new secure and fast hashing algorithm with multiple security levels (SFHA-MSL). It is based on the generic 3C (3 compressions) construction and the 3C-X (3C XOR) hash function which is the simplest and efficient variant of the generic 3C hash function and it is the simplest modification to the Merkle-Damgard (M-D) iterated construction ...
Hassan M. Elkamchouchi   +2 more
openaire   +2 more sources

Galois Field-Based Image Encryption for Remote Transmission of Tumor Ultrasound Images

open access: yesIEEE Access, 2019
The remote transmission of tumor ultrasound images is an important link in telemedicine. Based on the Galois field (GF), this paper proposes an encryption algorithm that ensures the security of tumor ultrasound images (TUIs) during the transmission ...
Nan Wang   +6 more
doaj   +1 more source

A Hybrid Domain Image Encryption Algorithm Based on Improved Henon Map

open access: yesEntropy, 2022
A hybrid domain image encryption algorithm is developed by integrating with improved Henon map, integer wavelet transform (IWT), bit-plane decomposition, and deoxyribonucleic acid (DNA) sequence operations. First, we improve the classical two-dimensional
Yong Chen, Shucui Xie, Jianzhong Zhang
doaj   +1 more source

A Perceptual Image Hashing Algorithm for Hybrid Document Security [PDF]

open access: yes2017 14th IAPR International Conference on Document Analysis and Recognition (ICDAR), 2017
In order to create an automatic document security system one needs to secure the textual content but also the graphical content of the document. This paper proposes a hashing algorithm capable of securing the graphical parts of paper and digital documents with unprecedented performance and a very small digest.
Sebastien Eskenazi   +3 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy