Results 161 to 170 of about 34,780 (224)
Weak Security Notions of Cryptographic Unkeyed Hash Functions and Their Amplifiability
Cryptographic unkeyed hash functions should satisfy preimage resistance, second-preimage resistance and collision resistance. In this article, weak second-preimage resistance and weak collision resistance are defined following the definition of weak one ...
Shoichi Hirose
openalex +2 more sources
Mobile cloud computing security using cryptographic hash function algorithm
The use of cloud computing in the year 2008 is 42.8 million and it increased up to 998 million users in the year 2014. In other hand, the growth is not followed by increasing of user trust in cloud based data management especially in business sector. Some companies is not interested in adopting cloud computing mobile service due to risks of security ...
Muhammad Arfan
openaire +3 more sources
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Sponge based Lightweight Cryptographic Hash Functions for IoT Applications
2021 International Conference on Intelligent Technologies (CONIT), 2021Hash constructions are used in cryptographic algorithms from very long. Features of Hashes that gives the applications the confidence to use them in security methodologies is “forward secrecy” Forward secrecy comes from one-way hash functions.
Deena Nath Gupta, Rajendra Kumar
semanticscholar +1 more source
Area–Time Efficient Implementation of NIST Lightweight Hash Functions Targeting IoT Applications
IEEE Internet of Things Journal, 2023To mitigate cybersecurity breaches, secure communication is crucial for the Internet of Things (IoT) environment. Data integrity is one of the most significant characteristics of security, which can be achieved by employing cryptographic hash functions ...
Safiullah Khan+5 more
semanticscholar +1 more source
2020 3rd International Conference on Intelligent Sustainable Systems (ICISS), 2020
Capacity Optimization in Cloud computing is a common term for innovations used to progress storage use by dwindling stored data. Crucial methodologies used for capacity optimization in cloud computing are data compression and data deduplication. Our paper focuses Capacity Optimization in connection with Deduplication procedures, which stare for ...
P. J. Sathish Kumar+5 more
openaire +2 more sources
Capacity Optimization in Cloud computing is a common term for innovations used to progress storage use by dwindling stored data. Crucial methodologies used for capacity optimization in cloud computing are data compression and data deduplication. Our paper focuses Capacity Optimization in connection with Deduplication procedures, which stare for ...
P. J. Sathish Kumar+5 more
openaire +2 more sources
On a probabilistic Approach to the Security Analysis of Cryptographic Hash Functions
Schmid Giovanni, Laccetti Giuliano
openaire +2 more sources
Secure Authentication in Multimodal Biometric Systems Using Cryptographic Hash Functions
2012In this Information Age, security of personal data is one of the biggest issues faced by most of the nations. Biometrics provides substantial help in guarding against attempts to establish fraudulent multiple identities or prevent identity fraud. The greatest advantage that the biometric data of an individual remains constant acts as its biggest ...
Aravind Ashok+2 more
openaire +2 more sources
H2B: Crypto Hash Functions Based on Hybrid Ring Generators
IEEE Transactions on Computer-Aided Design of Integrated Circuits and SystemsProtection of integrated circuits (ICs) against hardware security threats has been tackled by many schemes proposed to mitigate risks associated with an unauthorized access and usage of ICs in general, and intellectual property (IP) cores in particular ...
J. Rajski+3 more
semanticscholar +1 more source
High frequency implementation of cryptographic hash function Keccak-512 on FPGA devices
International Journal of Information and Computer Security, 2018Cryptographic hash functions have an important role in numerous cryptographic mechanisms like computing digital signatures, checking data integrity, storing passwords and generating random numbers. Due to the cryptanalysis attacks on hash functions, NIST
Soufiane El Moumni+2 more
semanticscholar +1 more source