Results 91 to 100 of about 34,780 (224)

Tightly-Secure Two-Tier Signatures on Code-Based Digital Signatures with Chameleon Hash Functions

open access: yesMathematics
In the current landscape where quantum algorithms pose a significant threat to conventional digital signature algorithms, code-based digital signature algorithms have emerged as the primary focus of ongoing research in post-quantum cryptography.
Yong Wang, Eddie Shahril Ismail
doaj   +1 more source

Novel key management and authentication scheme for ad hoc space networks

open access: yesTongxin xuebao, 2006
To be implemented using a flexible distributed architecture consisting of a constellation of dynamically de-ployed or configured satellites that were networked together into an integrated information system,the satellites could form an ad hoc self ...
YANG De-ming, MU De-jun, XU Zhong
doaj   +2 more sources

Solving Degree Bounds for Iterated Polynomial Systems

open access: yesIACR Transactions on Symmetric Cryptology
For Arithmetization-Oriented ciphers and hash functions Gröbner basis attacks are generally considered as the most competitive attack vector. Unfortunately, the complexity of Gröbner basis algorithms is only understood for special cases, and it is ...
Matthias Johann Steiner
doaj   +1 more source

Cloud Data Security through Hybrid Verification Technique Based on Cryptographic Hash Function

open access: yes, 2021
Encrypted communications have a long history of use. Today, however, we can protect information confidentiality and privacy, which is critical to contemporary encryption research. Encrypted data is also used in research initiatives including human behaviour, financial transactions, and economic, political, and social events.
openaire   +1 more source

Unpacking Blockchains

open access: yes, 2017
The Bitcoin digital currency appeared in 2009. Since this time, researchers and practitioners have looked under the hood of the open source Bitcoin currency, and discovered that Bitcoins Blockchain software architecture is useful for non-monetary ...
Prpić, J.
core  

Optimizing Blockchain Network Performance Using Blake3 Hash Function in POS Consensus Algorithm

open access: yesIEEE Access
Recent years have seen extensive adoption of blockchain technology across a variety of application domains, all with the goal of enhancing data privacy, system trustworthiness, and security. One of the biggest problems with blockchain is its inability to
Zainab Abdullah Jasim, Ameer Kadhim Hadi
doaj   +1 more source

Lightweight PUF-based anonymous authentication protocol in V2G

open access: yesTongxin xuebao
To address the issues of incomplete functionality, high communication overhead, and high computational cost in existing vehicle-to-grid (V2G) network authentication protocols, a lightweight anonymous authentication protocol based on physical unclonable ...
FAN Xinyue, LIU Jie, HE Jiahui
doaj  

Home - About - Disclaimer - Privacy