Results 161 to 170 of about 34,780 (224)

Weak Security Notions of Cryptographic Unkeyed Hash Functions and Their Amplifiability

open access: closedIEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences, 2003
Cryptographic unkeyed hash functions should satisfy preimage resistance, second-preimage resistance and collision resistance. In this article, weak second-preimage resistance and weak collision resistance are defined following the definition of weak one ...
Shoichi Hirose
openalex   +2 more sources

Mobile cloud computing security using cryptographic hash function algorithm

open access: closed2016 3rd International Conference on Information Technology, Computer, and Electrical Engineering (ICITACEE), 2016
The use of cloud computing in the year 2008 is 42.8 million and it increased up to 998 million users in the year 2014. In other hand, the growth is not followed by increasing of user trust in cloud based data management especially in business sector. Some companies is not interested in adopting cloud computing mobile service due to risks of security ...
Muhammad Arfan
openaire   +3 more sources

Sponge based Lightweight Cryptographic Hash Functions for IoT Applications

2021 International Conference on Intelligent Technologies (CONIT), 2021
Hash constructions are used in cryptographic algorithms from very long. Features of Hashes that gives the applications the confidence to use them in security methodologies is “forward secrecy” Forward secrecy comes from one-way hash functions.
Deena Nath Gupta, Rajendra Kumar
semanticscholar   +1 more source

Area–Time Efficient Implementation of NIST Lightweight Hash Functions Targeting IoT Applications

IEEE Internet of Things Journal, 2023
To mitigate cybersecurity breaches, secure communication is crucial for the Internet of Things (IoT) environment. Data integrity is one of the most significant characteristics of security, which can be achieved by employing cryptographic hash functions ...
Safiullah Khan   +5 more
semanticscholar   +1 more source

An Approach to Secure Capacity Optimization in Cloud Computing using Cryptographic Hash Function and Data De-duplication

2020 3rd International Conference on Intelligent Sustainable Systems (ICISS), 2020
Capacity Optimization in Cloud computing is a common term for innovations used to progress storage use by dwindling stored data. Crucial methodologies used for capacity optimization in cloud computing are data compression and data deduplication. Our paper focuses Capacity Optimization in connection with Deduplication procedures, which stare for ...
P. J. Sathish Kumar   +5 more
openaire   +2 more sources

Secure Authentication in Multimodal Biometric Systems Using Cryptographic Hash Functions

2012
In this Information Age, security of personal data is one of the biggest issues faced by most of the nations. Biometrics provides substantial help in guarding against attempts to establish fraudulent multiple identities or prevent identity fraud. The greatest advantage that the biometric data of an individual remains constant acts as its biggest ...
Aravind Ashok   +2 more
openaire   +2 more sources

H2B: Crypto Hash Functions Based on Hybrid Ring Generators

IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
Protection of integrated circuits (ICs) against hardware security threats has been tackled by many schemes proposed to mitigate risks associated with an unauthorized access and usage of ICs in general, and intellectual property (IP) cores in particular ...
J. Rajski   +3 more
semanticscholar   +1 more source

High frequency implementation of cryptographic hash function Keccak-512 on FPGA devices

International Journal of Information and Computer Security, 2018
Cryptographic hash functions have an important role in numerous cryptographic mechanisms like computing digital signatures, checking data integrity, storing passwords and generating random numbers. Due to the cryptanalysis attacks on hash functions, NIST
Soufiane El Moumni   +2 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy