Results 61 to 70 of about 339,481 (270)
High-Speed Variable Polynomial Toeplitz Hash Algorithm Based on FPGA
In the Quantum Key Distribution (QKD) network, authentication protocols play a critical role in safeguarding data interactions among users. To keep pace with the rapid advancement of QKD technology, authentication protocols must be capable of processing ...
Si-Cheng Huang+4 more
doaj +1 more source
Named data network dynamic cache placement strategy based on programmable data plane
A dynamic cache placement strategy is proposed to classify content according to whether is a need for retransmission. And the dynamic cache placement strategy and data plane forwarding function are realized by using the programmable language. Abstract Aiming at the efficiency and implementation of in‐network cache in Named Data Network, an in‐network ...
Saifeng Hou, Yuxiang Hu, Le Tian
wiley +1 more source
JAVASCRIPT SECURITY USING CRYPTOGRAPHIC HASH FUNCTIONS
The subject of this research is the development of methods of protection against attacks on third-party JavaScript and the document object model (DOM).
Irada Rahimova+3 more
doaj +1 more source
Applying Grover's Algorithm to Hash Functions: A Software Perspective [PDF]
Quantum software frameworks provide software engineers with the tools to study quantum algorithms as applied to practical problems. We implement classical hash functions MD5, SHA-1, SHA-2, and SHA-3 as quantum oracles to study the computational resource requirements of conducting a preimage attack with Grover's Algorithm. We introduce an improvement to
arxiv +1 more source
Proofs of Security for the Unix Password Hashing Algorithm [PDF]
We give the first proof of security for the full Unix password hashing algorithm (rather than of a simplified variant). Our results show that it is very good at extracting almost all of the available strength from the underlying cryptographic primitive and provide good reason for confidence in the Unix construction.
David Wagner, Ian Goldberg
openaire +2 more sources
SHAvisual: A Visualization Tool for the Secure Hash Algorithm [PDF]
SHAvisual: A Visualization Tool for the Secure Hash AlgorithmData security is vital to the world we live in, and the foundation that securecommunication is built upon is cryptography. Cryptography is a course that isregularly offered at colleges and universities.
Ching-Kuang Shene+5 more
openaire +2 more sources
A trust‐based mechanism for drones in smart cities
Abstract Smart cities equipped with intelligent devices can enhance the lifestyle and quality of humans by automatically and collaboratively acting as a sustainable resource to the ecosystem. In addition, the technological advancement can be further empowered by interconnecting various types of technologies, such as IoT, Artificial Intelligence, drones
Geetanjali Rathee+3 more
wiley +1 more source
Hashing technique based on SHA-3 using chaotic maps1
New hashing technique based on SHA-3 (Secure Hash Algorithm-3) is introduced. Chaotic maps are used in this technique to enhance performance without losing security.
A. V. Sidorenko, M. S. Shishko
doaj +1 more source
‘Lex Cryptographi(c)a,’ ‘Cloud Crypto Land’ or What? – Blockchain Technology on the Legal Hype Cycle
Based on the reception of DLT/blockchain, this article argues that legal discourse is subject to hype cycle dynamics. Thinking in hype cycle categories provides a structured way for analysing the legal implications of a particular innovation. This critical engagement with enthusiasts, sceptics and pragmatists through the different stages may help to ...
Michael Anderson Schillig
wiley +1 more source
Cuckoo Hashing in Cryptography: Optimal Parameters, Robustness and Applications [PDF]
Cuckoo hashing is a powerful primitive that enables storing items using small space with efficient querying. At a high level, cuckoo hashing maps $n$ items into $b$ entries storing at most $\ell$ items such that each item is placed into one of $k$ randomly chosen entries. Additionally, there is an overflow stash that can store at most $s$ items.
arxiv