Results 1 to 10 of about 2,695,884 (227)

SHA-1 and MD5 Cryptographic Hash Functions: Security Overview [PDF]

open access: hybridCommunications, 2015
Despite their obsolescence and recommendations they are phased out from production environment, MD5 and SHA-1 cryptographic hash functions remain defaults frequently offered in many applications, e.g., database managers.
Roman Jasek
doaj   +4 more sources

Lightweight Cryptographic Hash Functions: Design Trends, Comparative Study, and Future Directions

open access: yesIEEE Access, 2022
The emergence of the Internet of Things (IoT) has enabled billions of devices that collect large amounts of data to be connected. Therefore, IoT security has fundamental requirements. One critical aspect of IoT security is data integrity.
Susila Windarta   +4 more
doaj   +2 more sources

Theoretical and Experimental Analysis of Cryptographic Hash Functions

open access: yesJournal of Telecommunications and Information Technology, 2019
The paper presents a theoretical introduction to the cryptographic hash function theory and a statistical experimental analysis of selected hash functions.
Jacek Tchórzewsk   +1 more
doaj   +2 more sources

Verification of Implementations of Cryptographic Hash Functions

open access: yesIEEE Access, 2017
Cryptographic hash functions have become the basis of modern network computing for identity authorization and secure computing; protocol consistency of cryptographic hash functions is one of the most important properties that affect the security and ...
Dexi Wang   +5 more
doaj   +2 more sources

Security Properties of Domain Extenders for Cryptographic Hash Functions [PDF]

open access: bronzeJournal of Information Processing Systems, 2010
Cryptographic hash functions reduce inputs of arbitrary or very large length to a short string of fixed length. All hash function designs start from a compression function with fixed length inputs. The compression function itself is designed from scratch,
Elena Andreeva   +2 more
openalex   +2 more sources

JAVASCRIPT SECURITY USING CRYPTOGRAPHIC HASH FUNCTIONS

open access: goldСучасні інформаційні системи, 2019
The subject of this research is the development of methods of protection against attacks on third-party JavaScript and the document object model (DOM).
Irada Rahimova   +3 more
doaj   +3 more sources

Key derivation function: key-hash based computational extractor and stream based pseudorandom expander [PDF]

open access: yesPeerJ Computer Science
The key derivation function is a specific cryptographic algorithm that transforms private string and public strings into one or more cryptographic keys.
Chai Wen Chuah   +2 more
doaj   +3 more sources

Efficient Implementation of Lightweight Hash Functions on GPU and Quantum Computers for IoT Applications

open access: yesIEEE Access, 2022
Secure communication is important for Internet of Things (IoT) applications, to avoid cyber-security attacks. One of the key security aspects is data integrity, which can be protected by employing cryptographic hash functions.
Wai-Kong Lee   +5 more
doaj   +2 more sources

Performance Analysis of Cryptographic Hash Functions Suitable for Use in Blockchain

open access: yesInternational Journal of Computer Network and Information Security, 2021
A blockchain, or in other words a chain of transaction blocks, is a distributed database that maintains an ordered chain of blocks that reliably connect the information contained in them.
A. Kuznetsov   +5 more
semanticscholar   +1 more source

Design and Analysis of Area and Energy Efficient Reconfigurable Cryptographic Accelerator for Securing IoT Devices

open access: yesSensors, 2022
Achieving low-cost and high-performance network security communication is necessary for Internet of Things (IoT) devices, including intelligent sensors and mobile robots.
Xvpeng Zhang   +10 more
doaj   +1 more source

Home - About - Disclaimer - Privacy