Results 81 to 90 of about 339,481 (270)

Key derivation function: key-hash based computational extractor and stream based pseudorandom expander [PDF]

open access: yesPeerJ Computer Science
The key derivation function is a specific cryptographic algorithm that transforms private string and public strings into one or more cryptographic keys.
Chai Wen Chuah   +2 more
doaj   +2 more sources

S-GoSV: Framework for Generating Secure IEC 61850 GOOSE and Sample Value Messages

open access: yesEnergies, 2019
Standardized communication plays an important role in substation automation system (SAS). IEC 61850 is a de-facto standard in SAS. It facilitates smooth communication between different devices located in the substation by achieving interoperability ...
Shaik Mullapathi Farooq   +2 more
doaj   +1 more source

Keamanan Data Menggunakan Secure Hashing Algorithm (SHA)-256 dan Rivest Shamir Adleman (RSA) pada Digital Signature

open access: yesJurnal Teknologi Informasi dan Ilmu Komputer, 2023
Penelitian ini mempelajari bagaimana kriptografi menggunakan Secure Hash Algorthm 256 (SHA-256) dan Rivest Shamir Adleman (RSA) untuk menjaga keaslian Surat Keterangan Lulus (SKL) dengan menggunakan kode Quick Response (QR) berbasis web.
Juniar Hutagalung   +2 more
doaj   +1 more source

Analysis of the new standard hash function [PDF]

open access: yesInternational Conference on Computer Aided Systems Theory, 142-149, 2013, 2022
On 2$^{nd}$ October 2012 the NIST (National Institute of Standards and Technology) in the United States of America announced the new hashing algorithm which will be adopted as standard from now on. Among a total of 73 candidates, the winner was Keccak, designed by a group of cryptographers from Belgium and Italy.
arxiv  

Assessment of Practical Satellite Quantum Key Distribution Architectures for Current and Near‐Future Missions

open access: yesInternational Journal of Satellite Communications and Networking, EarlyView.
ABSTRACT Quantum key distribution (QKD) allows the generation of cryptographic keys beyond the computational hardness paradigm and is befitting for secure data transmission requiring long‐term security. The communication distance of fiber‐based QKD, however, is limited to a few hundred kilometers due to the exponential scaling of signal attenuation ...
Davide Orsucci   +7 more
wiley   +1 more source

Leveraging Blockchain and Smart Contracts to Combat Greenwashing in Sustainable Development

open access: yesSustainable Development, EarlyView.
ABSTRACT Blockchain technology, when combined with smart contracts, enables buyers to distinguish between greenwashed and genuinely eco‐friendly products. The presence of counterfeit items can severely impact supply chains by diminishing brand value, eroding consumer confidence, and undermining market trust.
Ragnhild Silkoset, Arne Nygaard
wiley   +1 more source

An Intrusion Resistant SCADA Framework Based on Quantum and Post-Quantum Scheme

open access: yesApplied Sciences, 2021
The rapid emergence of quantum computing threatens current Supervisory Control and Data Acquisition (SCADA) security standards, mainly, American Gas Association (AGA)-12.
Sagarika Ghosh   +3 more
doaj   +1 more source

A Quantum Algorithm To Locate Unknown Hashgrams [PDF]

open access: yesarXiv, 2020
Quantum computing has evolved quickly in recent years and is showing significant benefits in a variety of fields, especially in the realm of cybersecurity. The combination of software used to locate the most frequent hashes and $n$-grams that identify malicious software could greatly benefit from a quantum algorithm. By loading the table of hashes and $
arxiv  

An efficient hybrid hash based privacy amplification algorithm for quantum key distribution [PDF]

open access: yesarXiv, 2021
Privacy amplification (PA) is an essential part in a quantum key distribution (QKD) system, distilling a highly secure key from a partially secure string by public negotiation between two parties. The optimization objectives of privacy amplification for QKD are large block size, high throughput and low cost.
arxiv  

Home - About - Disclaimer - Privacy