Results 101 to 110 of about 2,695,884 (227)

Quality Analysis of a Chaotic Proven Keyed Hash Function [PDF]

open access: yesInternational Journal On Advances in Internet Technology. 5(1), pp.26-33, 2012, 2016
Hash functions are cryptographic tools, which are notably involved in integrity checking and password storage. They are of primary importance to improve the security of exchanges through the Internet. However, as security flaws have been recently identified in the current standard in this domain, new ways to hash digital data must be investigated.
arxiv  

Using fuzzy bits and neural networks to partially invert few rounds of some cryptographic hash functions [PDF]

open access: yesarXiv, 2019
We consider fuzzy, or continuous, bits, which take values in [0;1] and (-1;1] instead of {0;1}, and operations on them (NOT, XOR etc.) and on their sequences (ADD), to obtain the generalization of cryptographic hash functions, CHFs, for the messages consisting of fuzzy bits, so that CHFs become smooth and non-constant functions of each bit of the ...
arxiv  

Novel key management and authentication scheme for ad hoc space networks

open access: yesTongxin xuebao, 2006
To be implemented using a flexible distributed architecture consisting of a constellation of dynamically de-ployed or configured satellites that were networked together into an integrated information system,the satellites could form an ad hoc self ...
YANG De-ming, MU De-jun, XU Zhong
doaj   +2 more sources

Solving Degree Bounds for Iterated Polynomial Systems

open access: yesIACR Transactions on Symmetric Cryptology
For Arithmetization-Oriented ciphers and hash functions Gröbner basis attacks are generally considered as the most competitive attack vector. Unfortunately, the complexity of Gröbner basis algorithms is only understood for special cases, and it is ...
Matthias Johann Steiner
doaj   +1 more source

Optimizing Blockchain Network Performance Using Blake3 Hash Function in POS Consensus Algorithm

open access: yesIEEE Access
Recent years have seen extensive adoption of blockchain technology across a variety of application domains, all with the goal of enhancing data privacy, system trustworthiness, and security. One of the biggest problems with blockchain is its inability to
Zainab Abdullah Jasim, Ameer Kadhim Hadi
doaj   +1 more source

A Quantum-Resistant Photonic Hash Function [PDF]

open access: yesarXiv
We propose a quantum hash function based on Gaussian boson sampling on a photonic quantum computer, aiming to provide quantum-resistant security. Extensive simulations demonstrate that this hash function exhibits strong properties of preimage, second preimage, and collision resistance, which are essential for cryptographic applications.
arxiv  

Performance Evaluation of Hashing Algorithms on Commodity Hardware [PDF]

open access: yesarXiv
Hashing functions, which are created to provide brief and erratic digests for the message entered, are the primary cryptographic primitives used in blockchain networks. Hashing is employed in blockchain networks to create linked block lists, which offer safe and secure distributed repository storage for critical information. Due to the unique nature of
arxiv  

Lightweight PUF-based anonymous authentication protocol in V2G

open access: yesTongxin xuebao
To address the issues of incomplete functionality, high communication overhead, and high computational cost in existing vehicle-to-grid (V2G) network authentication protocols, a lightweight anonymous authentication protocol based on physical unclonable ...
FAN Xinyue, LIU Jie, HE Jiahui
doaj  

Home - About - Disclaimer - Privacy