Results 91 to 100 of about 34,780 (224)
Tightly-Secure Two-Tier Signatures on Code-Based Digital Signatures with Chameleon Hash Functions
In the current landscape where quantum algorithms pose a significant threat to conventional digital signature algorithms, code-based digital signature algorithms have emerged as the primary focus of ongoing research in post-quantum cryptography.
Yong Wang, Eddie Shahril Ismail
doaj +1 more source
Novel key management and authentication scheme for ad hoc space networks
To be implemented using a flexible distributed architecture consisting of a constellation of dynamically de-ployed or configured satellites that were networked together into an integrated information system,the satellites could form an ad hoc self ...
YANG De-ming, MU De-jun, XU Zhong
doaj +2 more sources
Solving Degree Bounds for Iterated Polynomial Systems
For Arithmetization-Oriented ciphers and hash functions Gröbner basis attacks are generally considered as the most competitive attack vector. Unfortunately, the complexity of Gröbner basis algorithms is only understood for special cases, and it is ...
Matthias Johann Steiner
doaj +1 more source
Cloud Data Security through Hybrid Verification Technique Based on Cryptographic Hash Function
Encrypted communications have a long history of use. Today, however, we can protect information confidentiality and privacy, which is critical to contemporary encryption research. Encrypted data is also used in research initiatives including human behaviour, financial transactions, and economic, political, and social events.
openaire +1 more source
The Bitcoin digital currency appeared in 2009. Since this time, researchers and practitioners have looked under the hood of the open source Bitcoin currency, and discovered that Bitcoins Blockchain software architecture is useful for non-monetary ...
Prpić, J.
core
Optimizing Blockchain Network Performance Using Blake3 Hash Function in POS Consensus Algorithm
Recent years have seen extensive adoption of blockchain technology across a variety of application domains, all with the goal of enhancing data privacy, system trustworthiness, and security. One of the biggest problems with blockchain is its inability to
Zainab Abdullah Jasim, Ameer Kadhim Hadi
doaj +1 more source
The First 30 Years of Cryptographic Hash Functions and the NIST SHA-3 Competition
B. Preneel
semanticscholar +1 more source
Building Provably Secure Block Ciphers from Cryptographic Hash Functions
openaire +2 more sources
Lightweight PUF-based anonymous authentication protocol in V2G
To address the issues of incomplete functionality, high communication overhead, and high computational cost in existing vehicle-to-grid (V2G) network authentication protocols, a lightweight anonymous authentication protocol based on physical unclonable ...
FAN Xinyue, LIU Jie, HE Jiahui
doaj
Secure IoV communications for smart fleet systems empowered with ASCON. [PDF]
A J B, Kaythry P.
europepmc +1 more source