Results 1 to 10 of about 37,820 (242)

SHA-1 and MD5 Cryptographic Hash Functions: Security Overview [PDF]

open access: hybridCommunications, 2015
Despite their obsolescence and recommendations they are phased out from production environment, MD5 and SHA-1 cryptographic hash functions remain defaults frequently offered in many applications, e.g., database managers.
Roman Jasek
doaj   +3 more sources

Lightweight Cryptographic Hash Functions: Design Trends, Comparative Study, and Future Directions

open access: yesIEEE Access, 2022
The emergence of the Internet of Things (IoT) has enabled billions of devices that collect large amounts of data to be connected. Therefore, IoT security has fundamental requirements. One critical aspect of IoT security is data integrity.
Susila Windarta   +4 more
doaj   +2 more sources

Two New Lightweight Cryptographic Hash Functions Based on Saturnin and Beetle for the Internet of Things

open access: yesIEEE Access, 2023
With the enormous growth in Internet of Things (IoT) applications, the volume of data shared among IoT devices is vastly increasing. Extensive IoT device connectivity and substantial data transmission have made information integrity susceptible to ...
Susila Windarta   +6 more
doaj   +2 more sources

Verification of Implementations of Cryptographic Hash Functions

open access: yesIEEE Access, 2017
Cryptographic hash functions have become the basis of modern network computing for identity authorization and secure computing; protocol consistency of cryptographic hash functions is one of the most important properties that affect the security and ...
Dexi Wang   +5 more
doaj   +2 more sources

Theoretical and Experimental Analysis of Cryptographic Hash Functions

open access: yesJournal of Telecommunications and Information Technology, 2019
The paper presents a theoretical introduction to the cryptographic hash function theory and a statistical experimental analysis of selected hash functions.
Jacek Tchórzewsk   +1 more
doaj   +2 more sources

Computational and Energy Costs of Cryptographic Algorithms on Handheld Devices [PDF]

open access: yesFuture Internet, 2011
Networks are evolving toward a ubiquitous model in which heterogeneous devices are interconnected. Cryptographic algorithms are required for developing security solutions that protect network activity. However, the computational and energy limitations of
Helena Rifà-Pous   +1 more
doaj   +6 more sources

A chaotic parallel hash engine with dynamic stochastic diffusion for blockchain and cloud security [PDF]

open access: yesScientific Reports
The design of cryptographic hash functions is crucial for ensuring the security of digital information. In this context, cellular automata (CAs) have emerged as a promising tool due to their inherent parallelism, determinism, and simplicity.
Qianyun Wang   +5 more
doaj   +2 more sources

A hybrid hash framework for post quantum secure zero knowledge identification [PDF]

open access: yesScientific Reports
The advent of quantum computing poses substantial risks to conventional cryptographic mechanisms, particularly hash-based authentication and zero-knowledge identification (ZKI) protocols, which are susceptible to quantum algorithms such as Grover’s and ...
Samarth Bhadane   +3 more
doaj   +2 more sources

JAVASCRIPT SECURITY USING CRYPTOGRAPHIC HASH FUNCTIONS

open access: diamondСучасні інформаційні системи, 2019
The subject of this research is the development of methods of protection against attacks on third-party JavaScript and the document object model (DOM).
Irada Rahimova   +3 more
doaj   +3 more sources

Enhanced image hash using cellular automata with sponge construction and elliptic curve cryptography for secure image transaction [PDF]

open access: yesScientific Reports
With the rapid development of digital communications, sensitive digital storage security, especially that of images, remains a significant challenge.
M. Mohammed Ibrahim   +6 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy