Results 71 to 80 of about 147,726 (298)

Design and Implementation of a Strong and Secure Lightweight Cryptographic Hash Algorithm using Elliptic Curve Concept: SSLHA-160

open access: yes, 2021
Cryptographic hash function assumes a fundamental job in numerous pieces of cryptographic algorithm and conventions, particularly in authentication, non-repudiation and information trustworthiness administrations.
Bhaskar Prakash Kosta, Pasala Sanyasi
semanticscholar   +1 more source

JAVASCRIPT SECURITY USING CRYPTOGRAPHIC HASH FUNCTIONS

open access: yesСучасні інформаційні системи, 2019
The subject of this research is the development of methods of protection against attacks on third-party JavaScript and the document object model (DOM).
Irada Rahimova   +3 more
doaj   +1 more source

A Color Image Encryption Algorithm Based on Hash Table, Hilbert Curve and Hyper-Chaotic Synchronization

open access: yesMathematics, 2023
Chaotic systems, especially hyper-chaotic systems are suitable for digital image encryption because of their complex properties such as pseudo randomness and extreme sensitivity. This paper proposes a new color image encryption algorithm based on a hyper-
Xiaoyuan Wang   +5 more
doaj   +1 more source

SHAvisual: A Visualization Tool for the Secure Hash Algorithm [PDF]

open access: yes2015 ASEE Annual Conference and Exposition Proceedings, 2015
SHAvisual: A Visualization Tool for the Secure Hash AlgorithmData security is vital to the world we live in, and the foundation that securecommunication is built upon is cryptography. Cryptography is a course that isregularly offered at colleges and universities.
Ching-Kuang Shene   +5 more
openaire   +2 more sources

High-Speed Variable Polynomial Toeplitz Hash Algorithm Based on FPGA

open access: yesEntropy, 2023
In the Quantum Key Distribution (QKD) network, authentication protocols play a critical role in safeguarding data interactions among users. To keep pace with the rapid advancement of QKD technology, authentication protocols must be capable of processing ...
Si-Cheng Huang   +4 more
doaj   +1 more source

Naturally Rehearsing Passwords [PDF]

open access: yes, 2013
We introduce quantitative usability and security models to guide the design of password management schemes --- systematic strategies to help users create and remember multiple passwords.
A. Acquisti   +18 more
core   +1 more source

Designing Physical Unclonable Functions From Optically Active Materials

open access: yesAdvanced Materials, EarlyView.
Assigning unforgeable “fingerprints” to manufactured goods is a key strategy to fight global counterfeiting. Optical physical unclonable functions (PUFs) are chemically generated random patterns of optically active materials serving as unique authenticators.
Maxime Klausen   +2 more
wiley   +1 more source

Rtl Implementation Of Secure Hash Algorithm 3 (Sha-3) Towards Smaller Area [PDF]

open access: yes, 2017
Secure data transfer has been the most challenging task for Internet of Things (IoT) devices. Data integrity must be ensured before and after the data transmission.
Lim , Yen Ruen
core  

Multi‐Level Optical Physical Unclonable Function Based on Random Surface Scattering for Hierarchical Cryptographic Protocols

open access: yesAdvanced Science, EarlyView.
This study proposed physical unclonable function based multi‐level key space generation scheme. By exploiting speckle characteristic, a size‐controllable structure is achieved and that is suitable foundation for multiple key extraction. The flexible key space supports various specifications for advanced applications, such as hierarchical authentication
Jeong Jin Kim, Min Seong Kim, Gil Ju Lee
wiley   +1 more source

Data Integrity and Security using Keccak and Digital Signature Algorithm (DSA)

open access: yesIJCCS (Indonesian Journal of Computing and Cybernetics Systems), 2019
Data security is a very important compilation using cloud computing; one of the research that is running and using cloud technology as a means of storage is G-Connect.
Muhammad Asghar Nazal   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy