Results 181 to 190 of about 37,820 (242)

Design and Implementation of a Fully Pipelined and Parameterizable Hardware Accelerator for BLAKE2 Cryptographic Hash Function in FPGA

2023 3rd Asian Conference on Innovation in Technology (ASIANCON), 2023
Cryptographic hash functions play a pivotal role in ensuring the security and integrity of data in various applications such as online banking, secure communications, and digital signatures.
Gauri S, S. K N, R. Bhakthavatchalu
semanticscholar   +1 more source

Area–Time Efficient Implementation of NIST Lightweight Hash Functions Targeting IoT Applications

IEEE Internet of Things Journal, 2023
To mitigate cybersecurity breaches, secure communication is crucial for the Internet of Things (IoT) environment. Data integrity is one of the most significant characteristics of security, which can be achieved by employing cryptographic hash functions ...
Safiullah Khan   +5 more
semanticscholar   +1 more source

Enhancing the Performance of Cryptographic Hash Function Using 2080 Bits Proposed Secure Hash Algorithm 160

International Journal of Scientific Research in Network Security and Communication
An on-way hash code or message authentication code is generated using the cryptographic hash functions. It used to be password storage, electronic data integrity, and check verification.
B. R. Ambedkar
semanticscholar   +1 more source

Cryptographic Hashing Beyond SHA: Designing collision-resistant, quantum-resilient hash functions

International Journal of Science and Research Archive
This paper examines the design of cryptographic hash functions beyond popular SHA algorithms with an eye to overcoming their drawbacks in the context of the new quantum computing threats. As quantum computing is introduced, known cryptographic algorithms,
Syed Khundmir Azmi
semanticscholar   +1 more source

SoK: Efficient Design and Implementation of Polynomial Hash Functions over Prime Fields

IEEE Symposium on Security and Privacy
Poly1305 is a widely-deployed polynomial hash function. The rationale behind its design was laid out in a series of papers by Bernstein, the last of which dates back to 2005.
Jean Paul Degabriele   +3 more
semanticscholar   +1 more source

H2B: Crypto Hash Functions Based on Hybrid Ring Generators

IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
Protection of integrated circuits (ICs) against hardware security threats has been tackled by many schemes proposed to mitigate risks associated with an unauthorized access and usage of ICs in general, and intellectual property (IP) cores in particular ...
J. Rajski   +3 more
semanticscholar   +1 more source

Optimal Security for Keyed Hash Functions: Avoiding Time-Space Tradeoffs for Finding Collisions

IACR Cryptology ePrint Archive, 2023
Cody R. Freitag   +2 more
semanticscholar   +1 more source

Climate change impacts on plant pathogens, food security and paths forward

Nature Reviews Microbiology, 2023
Brajesh K Singh   +2 more
exaly  

Home - About - Disclaimer - Privacy