Results 161 to 170 of about 2,695,884 (227)
Different Cryptographic Hash Functions for Security in the Blockchain
In day-to-day life, everyone is concerned about their security and privacy, and their concern becomes more when it comes to transactions. The technology behind blockchain is quite young.
Dhramandra Sharma, Monika Saxena
openalex +2 more sources
Novel Non-cryptographic Hash Functions for Networking and Security Applications on FPGA
This paper proposes the design and FPGA implementation of five novel non-cryptographic hash functions, that are suitable to be used in networking and security applications that require fast lookup and/or counting architectures.
Thomas Claesen+3 more
openalex +2 more sources
Performance and Security Tradeoffs in Cryptographic Hash Functions
A cryptographic hash function is an important component used in many applications, such as blockchain, authentication, data integrity, and digital signature.
Sultan Almuhammadi+1 more
openalex +2 more sources
Weak Security Notions of Cryptographic Unkeyed Hash Functions and Their Amplifiability
Cryptographic unkeyed hash functions should satisfy preimage resistance, second-preimage resistance and collision resistance. In this article, weak second-preimage resistance and weak collision resistance are defined following the definition of weak one ...
Shoichi Hirose
openalex +2 more sources
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Sponge based Lightweight Cryptographic Hash Functions for IoT Applications
2021 International Conference on Intelligent Technologies (CONIT), 2021Hash constructions are used in cryptographic algorithms from very long. Features of Hashes that gives the applications the confidence to use them in security methodologies is “forward secrecy” Forward secrecy comes from one-way hash functions.
Deena Nath Gupta, Rajendra Kumar
semanticscholar +1 more source
Recent developments in cryptographic hash functions: Security implications and future directions
Carlos Cid
openalex +2 more sources
Area–Time Efficient Implementation of NIST Lightweight Hash Functions Targeting IoT Applications
IEEE Internet of Things Journal, 2023To mitigate cybersecurity breaches, secure communication is crucial for the Internet of Things (IoT) environment. Data integrity is one of the most significant characteristics of security, which can be achieved by employing cryptographic hash functions ...
Safiullah Khan+5 more
semanticscholar +1 more source