Results 21 to 30 of about 34,780 (224)

Performance Analysis of Cryptographic Hash Functions Suitable for Use in Blockchain

open access: yesInternational Journal of Computer Network and Information Security, 2021
A blockchain, or in other words a chain of transaction blocks, is a distributed database that maintains an ordered chain of blocks that reliably connect the information contained in them.
A. Kuznetsov   +5 more
semanticscholar   +1 more source

Design and Analysis of Area and Energy Efficient Reconfigurable Cryptographic Accelerator for Securing IoT Devices

open access: yesSensors, 2022
Achieving low-cost and high-performance network security communication is necessary for Internet of Things (IoT) devices, including intelligent sensors and mobile robots.
Xvpeng Zhang   +10 more
doaj   +1 more source

The Random Oracle Methodology, Revisited [PDF]

open access: yes, 2000
We take a critical look at the relationship between the security of cryptographic schemes in the Random Oracle Model, and the security of the schemes that result from implementing the random oracle by so called "cryptographic hash functions".
Canetti, Ran   +2 more
core   +7 more sources

Investigating the Avalanche Effect of Various Cryptographically Secure Hash Functions and Hash-Based Applications

open access: yesIEEE Access, 2022
In modern cryptography, hash functions are considered as one of the key components for secure communication. They play a vital role in a wide range of applications such as ensuring the authentication and integrity of the data, in forensic investigation, password storage, random number generations for unique session keys, and for creating a unified view
Darshana Upadhyay   +3 more
openaire   +2 more sources

Keyed Parallel Hash Algorithm Based on Multiple Chaotic Maps (KPHA-MCM)

open access: yesIEEE Access, 2021
Hash functions are considered as the core of cryptography, which are the basic technique used for data security. Cryptographic hash functions also can be used to achieve the integrity of large data such as the data stored in a hard disk and set of ...
Roayat Ismail Abdelfatah   +2 more
doaj   +1 more source

High Throughput Implementation of the Keccak Hash Function Using the Nios-II Processor

open access: yesTechnologies, 2020
Presently, cryptographic hash functions play a critical role in many applications, such as digital signature systems, security communications, protocols, and network security infrastructures.
Argyrios Sideris   +2 more
doaj   +1 more source

An Anonymous Authentication Scheme Based on Chinese Residue Theorem in Wireless Body Area Networks

open access: yesMathematics, 2023
Considering the resource limitations of low-cost wireless sensors, there is a growing inclination to utilize cryptographic primitives that are optimized for efficiency, such as symmetric key encryption/decryption and hash functions, when designing ...
Jian Zhong   +4 more
doaj   +1 more source

On Cryptographic Hash Functions: Definitions, Ideas and Practical Cryptographic Attacks [PDF]

open access: yes, 2023
openHash functions, and cryptographic hash functions in particular, underpin the technologies on which modern life is built. Efficient databases, the Internet, the World Wide Web, online payments and more, would not be possible without the security and ...
DALLATORRE, FILIPPO
core  

Quantum security of hash functions and property-preservation of iterated hashing [PDF]

open access: yesPost-Quantum Cryptography, 2019
This work contains two major parts: comprehensively studying the security notions of cryptographic hash functions against quantum attacks and the relationships between them; and revisiting whether Merkle-Damgard and related iterated hash constructions ...
Benjamin J Hamlin, F. Song
semanticscholar   +1 more source

On the Design of Provably-Secure Cryptographic Hash Functions [PDF]

open access: yes, 1991
Recently, formal complexity-theoretic treatment of cryptographic hash functions was suggested. Two primitives of Collision-free hash functions and Universal one-way hash function families have been defined. The primitives have numerous applications in secure information compression, since their security implies that finding collisions is ...
Alfredo De Santis, Moti Yung
openaire   +1 more source

Home - About - Disclaimer - Privacy