Results 171 to 180 of about 34,780 (224)
Some of the next articles are maybe not open access.

An Optimal Lightweight Cryptographic Hash Function for Secure Image Transmission in Wireless Sensor Networks

2019
In the recent years, numerous security schemes have been proposed to secure the data and Digital Images (DI) over WSNs. Especially, encryption and decryption algorithms are structured and actualized to provide secrecy and security in WSN during the transmission of image-based information just as in storage.
Mohamed Elhoseny, K. Shankar
openaire   +2 more sources

Optimal Security for Keyed Hash Functions: Avoiding Time-Space Tradeoffs for Finding Collisions

IACR Cryptology ePrint Archive, 2023
Cody R. Freitag   +2 more
semanticscholar   +1 more source

Cryptographic hash functions: recent design trends and security notions [PDF]

open access: possible, 2010
Recent years have witnessed an exceptional research interest in cryptographic hash functions, especially after the popular attacks against MD5 and SHA-1 in 2005. In 2007, the U.S. National Institute of Standards and Technology (NIST) has also significantly boosted this interest by announcing a public competition to select the next hash function ...
Al-Kuwari, Saif   +2 more
openaire  

Advances and Open Problems in Federated Learning

Foundations and Trends in Machine Learning, 2021
Han Yu, Ana Cecilia Boetto
exaly  

Novel cryptographic hash function based on multiple compressive parallel structures

Soft Computing - A Fusion of Foundations, Methodologies and Applications, 2022
Yijun Yang   +4 more
semanticscholar   +1 more source

Property-Preserving Hash Functions for Hamming Distance from Standard Assumptions

International Conference on the Theory and Application of Cryptographic Techniques, 2022
Nils Fleischhacker   +2 more
semanticscholar   +1 more source

Practical Homomorphic Evaluation of Block-Cipher-Based Hash Functions with Applications

Foundations and Practice of Security, 2022
Adda-Akram Bendoukha   +4 more
semanticscholar   +1 more source

A Survey on Metaverse: Fundamentals, Security, and Privacy

IEEE Communications Surveys and Tutorials, 2023
Yuntao Wang, Zhou Su, Xiaofeng Tao
exaly  

EulerHash: Cryptographic Hash Function Using Geometric NP-Hardness and Lattice Compression for Post-Quantum Security

ELECTRONIC PAYMENT RECEIPT APPLICATION # 63/806,592 RECEIPT DATE / TIME 05/15/2025 8:33:32 PM ET ATTORNEY DOCKET # - Title of Invention EulerHash: Cryptographic Hash Function Using Geometric NP-Hardness and Lattice Compression for Post-Quantum Security Application Information APPLICATION TYPE Utility - Provisional Application under 35 USC ...
openaire   +1 more source

Home - About - Disclaimer - Privacy