Results 171 to 180 of about 37,820 (242)

Different Cryptographic Hash Functions for Security in the Blockchain

open access: closed2023 International Conference on Data Science and Network Security (ICDSNS), 2023
In day-to-day life, everyone is concerned about their security and privacy, and their concern becomes more when it comes to transactions. The technology behind blockchain is quite young.
Dhramandra Sharma, Monika Saxena
openalex   +2 more sources

Novel Non-cryptographic Hash Functions for Networking and Security Applications on FPGA

open access: closedEuromicro Symposium on Digital Systems Design, 2021
This paper proposes the design and FPGA implementation of five novel non-cryptographic hash functions, that are suitable to be used in networking and security applications that require fast lookup and/or counting architectures.
Thomas Claesen   +3 more
openalex   +2 more sources

Performance and Security Tradeoffs in Cryptographic Hash Functions

open access: closedInternational Journal of Interdisciplinary Telecommunications and Networking, 2020
A cryptographic hash function is an important component used in many applications, such as blockchain, authentication, data integrity, and digital signature.
Sultan Almuhammadi   +1 more
openalex   +2 more sources

Sponge based Lightweight Cryptographic Hash Functions for IoT Applications

2021 International Conference on Intelligent Technologies (CONIT), 2021
Hash constructions are used in cryptographic algorithms from very long. Features of Hashes that gives the applications the confidence to use them in security methodologies is “forward secrecy” Forward secrecy comes from one-way hash functions.
Deena Nath Gupta, Rajendra Kumar
semanticscholar   +1 more source

Weak Security Notions of Cryptographic Unkeyed Hash Functions and Their Amplifiability

open access: closedIEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences, 2003
Shoichi Hirose
openalex   +2 more sources

Home - About - Disclaimer - Privacy