Results 181 to 190 of about 37,820 (242)
Recent developments in cryptographic hash functions: Security implications and future directions
Carlos Cid
openalex +2 more sources
Some of the next articles are maybe not open access.
Related searches:
Related searches:
2023 3rd Asian Conference on Innovation in Technology (ASIANCON), 2023
Cryptographic hash functions play a pivotal role in ensuring the security and integrity of data in various applications such as online banking, secure communications, and digital signatures.
Gauri S, S. K N, R. Bhakthavatchalu
semanticscholar +1 more source
Cryptographic hash functions play a pivotal role in ensuring the security and integrity of data in various applications such as online banking, secure communications, and digital signatures.
Gauri S, S. K N, R. Bhakthavatchalu
semanticscholar +1 more source
Area–Time Efficient Implementation of NIST Lightweight Hash Functions Targeting IoT Applications
IEEE Internet of Things Journal, 2023To mitigate cybersecurity breaches, secure communication is crucial for the Internet of Things (IoT) environment. Data integrity is one of the most significant characteristics of security, which can be achieved by employing cryptographic hash functions ...
Safiullah Khan +5 more
semanticscholar +1 more source
International Journal of Scientific Research in Network Security and Communication
An on-way hash code or message authentication code is generated using the cryptographic hash functions. It used to be password storage, electronic data integrity, and check verification.
B. R. Ambedkar
semanticscholar +1 more source
An on-way hash code or message authentication code is generated using the cryptographic hash functions. It used to be password storage, electronic data integrity, and check verification.
B. R. Ambedkar
semanticscholar +1 more source
Cryptographic Hashing Beyond SHA: Designing collision-resistant, quantum-resilient hash functions
International Journal of Science and Research ArchiveThis paper examines the design of cryptographic hash functions beyond popular SHA algorithms with an eye to overcoming their drawbacks in the context of the new quantum computing threats. As quantum computing is introduced, known cryptographic algorithms,
Syed Khundmir Azmi
semanticscholar +1 more source
SoK: Efficient Design and Implementation of Polynomial Hash Functions over Prime Fields
IEEE Symposium on Security and PrivacyPoly1305 is a widely-deployed polynomial hash function. The rationale behind its design was laid out in a series of papers by Bernstein, the last of which dates back to 2005.
Jean Paul Degabriele +3 more
semanticscholar +1 more source
H2B: Crypto Hash Functions Based on Hybrid Ring Generators
IEEE Transactions on Computer-Aided Design of Integrated Circuits and SystemsProtection of integrated circuits (ICs) against hardware security threats has been tackled by many schemes proposed to mitigate risks associated with an unauthorized access and usage of ICs in general, and intellectual property (IP) cores in particular ...
J. Rajski +3 more
semanticscholar +1 more source
Optimal Security for Keyed Hash Functions: Avoiding Time-Space Tradeoffs for Finding Collisions
IACR Cryptology ePrint Archive, 2023Cody R. Freitag +2 more
semanticscholar +1 more source
Climate change impacts on plant pathogens, food security and paths forward
Nature Reviews Microbiology, 2023Brajesh K Singh +2 more
exaly
Some Observations on the Theory of Cryptographic Hash Functions
Des. Codes Cryptogr., 2006Douglas R Stinson
semanticscholar +1 more source

