Results 1 to 10 of about 2,695,884 (227)
SHA-1 and MD5 Cryptographic Hash Functions: Security Overview [PDF]
Despite their obsolescence and recommendations they are phased out from production environment, MD5 and SHA-1 cryptographic hash functions remain defaults frequently offered in many applications, e.g., database managers.
Roman Jasek
doaj +4 more sources
Lightweight Cryptographic Hash Functions: Design Trends, Comparative Study, and Future Directions
The emergence of the Internet of Things (IoT) has enabled billions of devices that collect large amounts of data to be connected. Therefore, IoT security has fundamental requirements. One critical aspect of IoT security is data integrity.
Susila Windarta+4 more
doaj +2 more sources
Theoretical and Experimental Analysis of Cryptographic Hash Functions
The paper presents a theoretical introduction to the cryptographic hash function theory and a statistical experimental analysis of selected hash functions.
Jacek Tchórzewsk+1 more
doaj +2 more sources
Verification of Implementations of Cryptographic Hash Functions
Cryptographic hash functions have become the basis of modern network computing for identity authorization and secure computing; protocol consistency of cryptographic hash functions is one of the most important properties that affect the security and ...
Dexi Wang+5 more
doaj +2 more sources
Security Properties of Domain Extenders for Cryptographic Hash Functions [PDF]
Cryptographic hash functions reduce inputs of arbitrary or very large length to a short string of fixed length. All hash function designs start from a compression function with fixed length inputs. The compression function itself is designed from scratch,
Elena Andreeva+2 more
openalex +2 more sources
JAVASCRIPT SECURITY USING CRYPTOGRAPHIC HASH FUNCTIONS
The subject of this research is the development of methods of protection against attacks on third-party JavaScript and the document object model (DOM).
Irada Rahimova+3 more
doaj +3 more sources
Key derivation function: key-hash based computational extractor and stream based pseudorandom expander [PDF]
The key derivation function is a specific cryptographic algorithm that transforms private string and public strings into one or more cryptographic keys.
Chai Wen Chuah+2 more
doaj +3 more sources
Secure communication is important for Internet of Things (IoT) applications, to avoid cyber-security attacks. One of the key security aspects is data integrity, which can be protected by employing cryptographic hash functions.
Wai-Kong Lee+5 more
doaj +2 more sources
Performance Analysis of Cryptographic Hash Functions Suitable for Use in Blockchain
A blockchain, or in other words a chain of transaction blocks, is a distributed database that maintains an ordered chain of blocks that reliably connect the information contained in them.
A. Kuznetsov+5 more
semanticscholar +1 more source
Achieving low-cost and high-performance network security communication is necessary for Internet of Things (IoT) devices, including intelligent sensors and mobile robots.
Xvpeng Zhang+10 more
doaj +1 more source