Results 71 to 80 of about 142,210 (279)

A Color Image Encryption Algorithm Based on Hash Table, Hilbert Curve and Hyper-Chaotic Synchronization

open access: yesMathematics, 2023
Chaotic systems, especially hyper-chaotic systems are suitable for digital image encryption because of their complex properties such as pseudo randomness and extreme sensitivity. This paper proposes a new color image encryption algorithm based on a hyper-
Xiaoyuan Wang   +5 more
doaj   +1 more source

Making Existential-Unforgeable Signatures Strongly Unforgeable in the Quantum Random-Oracle Model [PDF]

open access: yes, 2015
Strongly unforgeable signature schemes provide a more stringent security guarantee than the standard existential unforgeability. It requires that not only forging a signature on a new message is hard, it is infeasible as well to produce a new signature ...
Eaton, Edward, Song, Fang
core   +3 more sources

SHAvisual: A Visualization Tool for the Secure Hash Algorithm [PDF]

open access: yes2015 ASEE Annual Conference and Exposition Proceedings, 2015
SHAvisual: A Visualization Tool for the Secure Hash AlgorithmData security is vital to the world we live in, and the foundation that securecommunication is built upon is cryptography. Cryptography is a course that isregularly offered at colleges and universities.
Ching-Kuang Shene   +5 more
openaire   +2 more sources

High-Speed Variable Polynomial Toeplitz Hash Algorithm Based on FPGA

open access: yesEntropy, 2023
In the Quantum Key Distribution (QKD) network, authentication protocols play a critical role in safeguarding data interactions among users. To keep pace with the rapid advancement of QKD technology, authentication protocols must be capable of processing ...
Si-Cheng Huang   +4 more
doaj   +1 more source

Data Integrity and Security using Keccak and Digital Signature Algorithm (DSA)

open access: yesIJCCS (Indonesian Journal of Computing and Cybernetics Systems), 2019
Data security is a very important compilation using cloud computing; one of the research that is running and using cloud technology as a means of storage is G-Connect.
Muhammad Asghar Nazal   +2 more
doaj   +1 more source

Blockchain‐Empowered H‐CPS Architecture for Smart Agriculture

open access: yesAdvanced Science, EarlyView.
This article reviews the current system architectures for smart agriculture and proposes a blockchain‐empowered hierarchical cyber‐physical system (H‐CPS) framework. It discusses the challenges and outlines future research directions, including the use of semantic blockchain to handle complex data and models.
Xiaoding Wang   +8 more
wiley   +1 more source

Hashing technique based on SHA-3 using chaotic maps1

open access: yesInformatika, 2020
New hashing technique based on SHA-3 (Secure Hash Algorithm-3) is introduced. Chaotic maps are used in this technique to enhance performance without losing security.
A. V. Sidorenko, M. S. Shishko
doaj   +1 more source

Rtl Implementation Of Secure Hash Algorithm 3 (Sha-3) Towards Smaller Area [PDF]

open access: yes, 2017
Secure data transfer has been the most challenging task for Internet of Things (IoT) devices. Data integrity must be ensured before and after the data transmission.
Lim , Yen Ruen
core  

When private set intersection meets big data : an efficient and scalable protocol [PDF]

open access: yes, 2013
Large scale data processing brings new challenges to the design of privacy-preserving protocols: how to meet the increasing requirements of speed and throughput of modern applications, and how to scale up smoothly when data being protected is big ...
Changyu Dong   +3 more
core   +3 more sources

Hyperledger Fabric for the (digitalized) lifecycle of construction products: Applied review on fastening technology

open access: yesCivil Engineering Design, Volume 7, Issue 1, Page 9-22, March 2025.
Abstract Blockchain technology is a digital decentralized data ledger recording transactions in an encrypted format. Its implementation can potentially hold significant advantages for the built environment, particularly in manufacturing and building product usage aligned with Building Information Modeling (BIM). This paradigm shift toward decentralized
Aileen Pfeil   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy