Results 101 to 110 of about 2,695,884 (227)
Quality Analysis of a Chaotic Proven Keyed Hash Function [PDF]
Hash functions are cryptographic tools, which are notably involved in integrity checking and password storage. They are of primary importance to improve the security of exchanges through the Internet. However, as security flaws have been recently identified in the current standard in this domain, new ways to hash digital data must be investigated.
arxiv
Using fuzzy bits and neural networks to partially invert few rounds of some cryptographic hash functions [PDF]
We consider fuzzy, or continuous, bits, which take values in [0;1] and (-1;1] instead of {0;1}, and operations on them (NOT, XOR etc.) and on their sequences (ADD), to obtain the generalization of cryptographic hash functions, CHFs, for the messages consisting of fuzzy bits, so that CHFs become smooth and non-constant functions of each bit of the ...
arxiv
Novel key management and authentication scheme for ad hoc space networks
To be implemented using a flexible distributed architecture consisting of a constellation of dynamically de-ployed or configured satellites that were networked together into an integrated information system,the satellites could form an ad hoc self ...
YANG De-ming, MU De-jun, XU Zhong
doaj +2 more sources
Solving Degree Bounds for Iterated Polynomial Systems
For Arithmetization-Oriented ciphers and hash functions Gröbner basis attacks are generally considered as the most competitive attack vector. Unfortunately, the complexity of Gröbner basis algorithms is only understood for special cases, and it is ...
Matthias Johann Steiner
doaj +1 more source
Optimizing Blockchain Network Performance Using Blake3 Hash Function in POS Consensus Algorithm
Recent years have seen extensive adoption of blockchain technology across a variety of application domains, all with the goal of enhancing data privacy, system trustworthiness, and security. One of the biggest problems with blockchain is its inability to
Zainab Abdullah Jasim, Ameer Kadhim Hadi
doaj +1 more source
A Quantum-Resistant Photonic Hash Function [PDF]
We propose a quantum hash function based on Gaussian boson sampling on a photonic quantum computer, aiming to provide quantum-resistant security. Extensive simulations demonstrate that this hash function exhibits strong properties of preimage, second preimage, and collision resistance, which are essential for cryptographic applications.
arxiv
Performance Evaluation of Hashing Algorithms on Commodity Hardware [PDF]
Hashing functions, which are created to provide brief and erratic digests for the message entered, are the primary cryptographic primitives used in blockchain networks. Hashing is employed in blockchain networks to create linked block lists, which offer safe and secure distributed repository storage for critical information. Due to the unique nature of
arxiv
The First 30 Years of Cryptographic Hash Functions and the NIST SHA-3 Competition
B. Preneel
semanticscholar +1 more source
Lightweight PUF-based anonymous authentication protocol in V2G
To address the issues of incomplete functionality, high communication overhead, and high computational cost in existing vehicle-to-grid (V2G) network authentication protocols, a lightweight anonymous authentication protocol based on physical unclonable ...
FAN Xinyue, LIU Jie, HE Jiahui
doaj