Results 41 to 50 of about 339,481 (270)

A preimage attack on reduced GIMLI‐HASH with unbalanced squeezing phase

open access: yesIET Information Security, Volume 17, Issue 1, Page 66-79, January 2023., 2023
Abstract In Conference on Cryptographic Hardware and Embedded System 2017, Bernstein et al. proposed GIMLI, a 384‐bit permutation with 24 rounds, which aims to provide high performance on various platforms. In 2019, the full‐round (24 rounds) GIMLI permutation was used as an underlying primitive for building AEAD GIMLI‐CIPHER and hash function GIMLI ...
Yongseong Lee   +3 more
wiley   +1 more source

Secure and Fast Hashing Algorithm with Multiple Security Levels

open access: yesJournal of Software, 2009
We propose a new secure and fast hashing algorithm with multiple security levels (SFHA-MSL). It is based on the generic 3C (3 compressions) construction and the 3C-X (3C XOR) hash function which is the simplest and efficient variant of the generic 3C hash function and it is the simplest modification to the Merkle-Damgard (M-D) iterated construction ...
Hassan M. Elkamchouchi   +2 more
openaire   +2 more sources

T‐depth reduction method for efficient SHA‐256 quantum circuit construction

open access: yesIET Information Security, Volume 17, Issue 1, Page 46-65, January 2023., 2023
Abstract To perform a quantum brute force attack on a cryptosystem based on Grover's algorithm, it is necessary to implement a quantum circuit of the cryptographic algorithm. Therefore, an efficient quantum circuit design of a given cryptographic algorithm is essential, especially in terms of quantum security analysis, and it is well known that T‐depth
Jongheon Lee   +3 more
wiley   +1 more source

A Large-Scale Secure Image Retrieval Method in Cloud Environment

open access: yesIEEE Access, 2019
With the rapid development of cloud computing technology, more and more users choose to outsource image data to clouds. To protect data's confidentiality, images need to be encrypted before being outsourced to clouds, but this brings difficulties to some
Yanyan Xu, Xiao Zhao, Jiaying Gong
doaj   +1 more source

Secured Medical Image Hashing Based on Frequency Domain with Chaotic Map [PDF]

open access: yesEngineering and Technology Journal, 2021
Recently, online-medicine got increased global interest, particularly during COVID19 pandemic. Data protection is important in the medical field since when promoting telemedicine applications, it is necessary to protect the patient data and personal ...
Amira Jabbar   +2 more
doaj   +1 more source

Regular and almost universal hashing: an efficient implementation [PDF]

open access: yesSoftware: Practice and Experience 47 (10), 2017, 2016
Random hashing can provide guarantees regarding the performance of data structures such as hash tables---even in an adversarial setting. Many existing families of hash functions are universal: given two data objects, the probability that they have the same hash value is low given that we pick hash functions at random.
arxiv   +1 more source

DeepCatra: Learning flow‐ and graph‐based behaviours for Android malware detection

open access: yesIET Information Security, Volume 17, Issue 1, Page 118-130, January 2023., 2023
Abstract As Android malware grows and evolves, deep learning has been introduced into malware detection, resulting in great effectiveness. Recent work is considering hybrid models and multi‐view learning. However, they use only simple features, limiting the accuracy of these approaches in practice.
Yafei Wu   +4 more
wiley   +1 more source

A novel subset-based polynomial design for enhancing the security of short message-digest with inflated avalanche and random responses

open access: yesJournal of King Saud University: Computer and Information Sciences, 2023
The data breach and the integrity violation of remote data remain significant issues in the domain of information security. A provably-secure hash function aids in providing solutions to integrity-related issues.
P. Karthik   +5 more
doaj  

Implementasi Sistem Otentikasi Dokumen Berbasis Quick Response (QR) Code dan Digital Signature

open access: yesJurnal RESTI (Rekayasa Sistem dan Teknologi Informasi), 2021
The authenticity and integrity of documents are essential in data exchange and communication. Digital documents must be verifiable for their authenticity and integrity by all parties that use the documents.
Antika Lorien, Theophilus Wellem
doaj   +1 more source

Improved lattice‐based mix‐nets for electronic voting

open access: yesIET Information Security, Volume 17, Issue 1, Page 18-34, January 2023., 2023
Abstract Mix‐networks were first proposed by Chaum in the late 1970s–early 1980s as a general tool for building anonymous communication systems. Classical mix‐net implementations rely on standard public key primitives (e.g., ElGamal encryption) that will become vulnerable when a sufficiently powerful quantum computer will be built.
Valeh Farzaliyev   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy