Results 171 to 180 of about 34,780 (224)
Some of the next articles are maybe not open access.
2019
In the recent years, numerous security schemes have been proposed to secure the data and Digital Images (DI) over WSNs. Especially, encryption and decryption algorithms are structured and actualized to provide secrecy and security in WSN during the transmission of image-based information just as in storage.
Mohamed Elhoseny, K. Shankar
openaire +2 more sources
In the recent years, numerous security schemes have been proposed to secure the data and Digital Images (DI) over WSNs. Especially, encryption and decryption algorithms are structured and actualized to provide secrecy and security in WSN during the transmission of image-based information just as in storage.
Mohamed Elhoseny, K. Shankar
openaire +2 more sources
Optimal Security for Keyed Hash Functions: Avoiding Time-Space Tradeoffs for Finding Collisions
IACR Cryptology ePrint Archive, 2023Cody R. Freitag+2 more
semanticscholar +1 more source
Cryptographic hash functions: recent design trends and security notions [PDF]
Recent years have witnessed an exceptional research interest in cryptographic hash functions, especially after the popular attacks against MD5 and SHA-1 in 2005. In 2007, the U.S. National Institute of Standards and Technology (NIST) has also significantly boosted this interest by announcing a public competition to select the next hash function ...
Al-Kuwari, Saif+2 more
openaire
Advances and Open Problems in Federated Learning
Foundations and Trends in Machine Learning, 2021Han Yu, Ana Cecilia Boetto
exaly
Some Observations on the Theory of Cryptographic Hash Functions
Des. Codes Cryptogr., 2006Douglas R Stinson
semanticscholar +1 more source
Novel cryptographic hash function based on multiple compressive parallel structures
Soft Computing - A Fusion of Foundations, Methodologies and Applications, 2022Yijun Yang+4 more
semanticscholar +1 more source
Property-Preserving Hash Functions for Hamming Distance from Standard Assumptions
International Conference on the Theory and Application of Cryptographic Techniques, 2022Nils Fleischhacker+2 more
semanticscholar +1 more source
Practical Homomorphic Evaluation of Block-Cipher-Based Hash Functions with Applications
Foundations and Practice of Security, 2022Adda-Akram Bendoukha+4 more
semanticscholar +1 more source
A Survey on Metaverse: Fundamentals, Security, and Privacy
IEEE Communications Surveys and Tutorials, 2023Yuntao Wang, Zhou Su, Xiaofeng Tao
exaly
ELECTRONIC PAYMENT RECEIPT APPLICATION # 63/806,592 RECEIPT DATE / TIME 05/15/2025 8:33:32 PM ET ATTORNEY DOCKET # - Title of Invention EulerHash: Cryptographic Hash Function Using Geometric NP-Hardness and Lattice Compression for Post-Quantum Security Application Information APPLICATION TYPE Utility - Provisional Application under 35 USC ...
openaire +1 more source
openaire +1 more source