USING GOST 34.11-2018 IN THE FRI PROTOCOL
The paper addresses the applicability of domestic cryptographic algorithms in modern zero-knowledge proof (ZKP) systems, which are increasingly used in blockchains, digital identity platforms, medical and biometric systems, as well as in machine learning
Vladlen D. Afonin, Sergey V. Zapechnikov
doaj +1 more source
Security of a New Cryptographic Hash Function - Titanium
Abdullah Nazeeh Saleh +1 more
openalex +2 more sources
Cryptographic hash functions: recent design trends and security notions [PDF]
Saif Al‐Kuwari +2 more
openalex
The First 30 Years of Cryptographic Hash Functions and the NIST SHA-3 Competition
B. Preneel
semanticscholar +1 more source
Lightweight three-factor authentication protocol for 6G-enabled healthcare systems using Chebyshev chaotic maps and BioHashing. [PDF]
Abbas AM, Nasr ME, Abdelfatah RI.
europepmc +1 more source
A Lightweight Authentication and Key Distribution Protocol for XR Glasses Using PUF and Cloud-Assisted ECC. [PDF]
Cha W, Lee HJ, Kook S, Kim K, Won D.
europepmc +1 more source
Anonymous and Efficient Chaotic Map-Based Authentication Protocol for Industrial Internet of Things. [PDF]
Zeng D +6 more
europepmc +1 more source
The Untapped Potential of Ascon Hash Functions: Benchmarking, Hardware Profiling, and Application Insights for Secure IoT and Blockchain Systems. [PDF]
Gladis Kurian M, Chen Y.
europepmc +1 more source
A secure multi phase authentication protocol for cloud infrastructure using elliptic curve cryptography. [PDF]
Sivasankar R, Marikkannan M.
europepmc +1 more source

