Results 61 to 70 of about 339,481 (270)

High-Speed Variable Polynomial Toeplitz Hash Algorithm Based on FPGA

open access: yesEntropy, 2023
In the Quantum Key Distribution (QKD) network, authentication protocols play a critical role in safeguarding data interactions among users. To keep pace with the rapid advancement of QKD technology, authentication protocols must be capable of processing ...
Si-Cheng Huang   +4 more
doaj   +1 more source

Named data network dynamic cache placement strategy based on programmable data plane

open access: yesIET Networks, Volume 12, Issue 1, Page 27-35, January 2023., 2023
A dynamic cache placement strategy is proposed to classify content according to whether is a need for retransmission. And the dynamic cache placement strategy and data plane forwarding function are realized by using the programmable language. Abstract Aiming at the efficiency and implementation of in‐network cache in Named Data Network, an in‐network ...
Saifeng Hou, Yuxiang Hu, Le Tian
wiley   +1 more source

JAVASCRIPT SECURITY USING CRYPTOGRAPHIC HASH FUNCTIONS

open access: yesСучасні інформаційні системи, 2019
The subject of this research is the development of methods of protection against attacks on third-party JavaScript and the document object model (DOM).
Irada Rahimova   +3 more
doaj   +1 more source

Applying Grover's Algorithm to Hash Functions: A Software Perspective [PDF]

open access: yes, 2022
Quantum software frameworks provide software engineers with the tools to study quantum algorithms as applied to practical problems. We implement classical hash functions MD5, SHA-1, SHA-2, and SHA-3 as quantum oracles to study the computational resource requirements of conducting a preimage attack with Grover's Algorithm. We introduce an improvement to
arxiv   +1 more source

Proofs of Security for the Unix Password Hashing Algorithm [PDF]

open access: yes, 2000
We give the first proof of security for the full Unix password hashing algorithm (rather than of a simplified variant). Our results show that it is very good at extracting almost all of the available strength from the underlying cryptographic primitive and provide good reason for confidence in the Unix construction.
David Wagner, Ian Goldberg
openaire   +2 more sources

SHAvisual: A Visualization Tool for the Secure Hash Algorithm [PDF]

open access: yes2015 ASEE Annual Conference and Exposition Proceedings, 2015
SHAvisual: A Visualization Tool for the Secure Hash AlgorithmData security is vital to the world we live in, and the foundation that securecommunication is built upon is cryptography. Cryptography is a course that isregularly offered at colleges and universities.
Ching-Kuang Shene   +5 more
openaire   +2 more sources

A trust‐based mechanism for drones in smart cities

open access: yesIET Smart Cities, Volume 4, Issue 4, Page 255-264, December 2022., 2022
Abstract Smart cities equipped with intelligent devices can enhance the lifestyle and quality of humans by automatically and collaboratively acting as a sustainable resource to the ecosystem. In addition, the technological advancement can be further empowered by interconnecting various types of technologies, such as IoT, Artificial Intelligence, drones
Geetanjali Rathee   +3 more
wiley   +1 more source

Hashing technique based on SHA-3 using chaotic maps1

open access: yesInformatika, 2020
New hashing technique based on SHA-3 (Secure Hash Algorithm-3) is introduced. Chaotic maps are used in this technique to enhance performance without losing security.
A. V. Sidorenko, M. S. Shishko
doaj   +1 more source

‘Lex Cryptographi(c)a,’ ‘Cloud Crypto Land’ or What? – Blockchain Technology on the Legal Hype Cycle

open access: yesThe Modern Law Review, Volume 86, Issue 1, Page 31-66, January 2023., 2023
Based on the reception of DLT/blockchain, this article argues that legal discourse is subject to hype cycle dynamics. Thinking in hype cycle categories provides a structured way for analysing the legal implications of a particular innovation. This critical engagement with enthusiasts, sceptics and pragmatists through the different stages may help to ...
Michael Anderson Schillig
wiley   +1 more source

Cuckoo Hashing in Cryptography: Optimal Parameters, Robustness and Applications [PDF]

open access: yesarXiv, 2023
Cuckoo hashing is a powerful primitive that enables storing items using small space with efficient querying. At a high level, cuckoo hashing maps $n$ items into $b$ entries storing at most $\ell$ items such that each item is placed into one of $k$ randomly chosen entries. Additionally, there is an overflow stash that can store at most $s$ items.
arxiv  

Home - About - Disclaimer - Privacy