Results 71 to 80 of about 142,210 (279)
Chaotic systems, especially hyper-chaotic systems are suitable for digital image encryption because of their complex properties such as pseudo randomness and extreme sensitivity. This paper proposes a new color image encryption algorithm based on a hyper-
Xiaoyuan Wang+5 more
doaj +1 more source
Making Existential-Unforgeable Signatures Strongly Unforgeable in the Quantum Random-Oracle Model [PDF]
Strongly unforgeable signature schemes provide a more stringent security guarantee than the standard existential unforgeability. It requires that not only forging a signature on a new message is hard, it is infeasible as well to produce a new signature ...
Eaton, Edward, Song, Fang
core +3 more sources
SHAvisual: A Visualization Tool for the Secure Hash Algorithm [PDF]
SHAvisual: A Visualization Tool for the Secure Hash AlgorithmData security is vital to the world we live in, and the foundation that securecommunication is built upon is cryptography. Cryptography is a course that isregularly offered at colleges and universities.
Ching-Kuang Shene+5 more
openaire +2 more sources
High-Speed Variable Polynomial Toeplitz Hash Algorithm Based on FPGA
In the Quantum Key Distribution (QKD) network, authentication protocols play a critical role in safeguarding data interactions among users. To keep pace with the rapid advancement of QKD technology, authentication protocols must be capable of processing ...
Si-Cheng Huang+4 more
doaj +1 more source
Data Integrity and Security using Keccak and Digital Signature Algorithm (DSA)
Data security is a very important compilation using cloud computing; one of the research that is running and using cloud technology as a means of storage is G-Connect.
Muhammad Asghar Nazal+2 more
doaj +1 more source
Blockchain‐Empowered H‐CPS Architecture for Smart Agriculture
This article reviews the current system architectures for smart agriculture and proposes a blockchain‐empowered hierarchical cyber‐physical system (H‐CPS) framework. It discusses the challenges and outlines future research directions, including the use of semantic blockchain to handle complex data and models.
Xiaoding Wang+8 more
wiley +1 more source
Hashing technique based on SHA-3 using chaotic maps1
New hashing technique based on SHA-3 (Secure Hash Algorithm-3) is introduced. Chaotic maps are used in this technique to enhance performance without losing security.
A. V. Sidorenko, M. S. Shishko
doaj +1 more source
Rtl Implementation Of Secure Hash Algorithm 3 (Sha-3) Towards Smaller Area [PDF]
Secure data transfer has been the most challenging task for Internet of Things (IoT) devices. Data integrity must be ensured before and after the data transmission.
Lim , Yen Ruen
core
When private set intersection meets big data : an efficient and scalable protocol [PDF]
Large scale data processing brings new challenges to the design of privacy-preserving protocols: how to meet the increasing requirements of speed and throughput of modern applications, and how to scale up smoothly when data being protected is big ...
Changyu Dong+3 more
core +3 more sources
Abstract Blockchain technology is a digital decentralized data ledger recording transactions in an encrypted format. Its implementation can potentially hold significant advantages for the built environment, particularly in manufacturing and building product usage aligned with Building Information Modeling (BIM). This paradigm shift toward decentralized
Aileen Pfeil+2 more
wiley +1 more source