Efficient module learning with errors‐based post‐quantum password‐authenticated key exchange
Abstract Password‐authenticated key exchange (PAKE) is a cryptographic primitive that can establish secure remote communications between the client and the server, especially with the advantage of amplifying memorable passwords into strong session keys.
Peixin Ren, Xiaozhuo Gu, Ziliang Wang
wiley +1 more source
Synonym‐based multi‐keyword ranked search with secure k‐NN in 6G network
Abstract Sixth Generation (6G) integrates the next generation communication systems such as maritime, terrestrial, and aerial to offer robust network and massive device connectivity with ultra‐low latency requirement. The cutting edge technologies such as artificial intelligence, quantum machine learning, and millimetre enable hyper‐connectivity to ...
Deebak Bakkiam David, Fadi Al‐Turjman
wiley +1 more source
Quantum security of hash functions and property-preservation of iterated hashing [PDF]
This work contains two major parts: comprehensively studying the security notions of cryptographic hash functions against quantum attacks and the relationships between them; and revisiting whether Merkle-Damgard and related iterated hash constructions ...
Benjamin J Hamlin, F. Song
semanticscholar +1 more source
Secured‐KDS: Secret key distribution and authentication scheme for resource‐constrained devices
Abstract In the era of the Internet of things (IoT), billions of electrical devices are connected to the Internet and communicate remotely with one another without any human intervention. IoT devices often do not enforce proper security measures; this raises serious privacy and security concerns.
Selvakumar Manickam, Shafiq Ul Rehman
wiley +1 more source
Merkle-Damgård Construction Method and Alternatives: A Review
Cryptographic hash function is an important cryptographic tool in the field of information security. Design of most widely used hash functions such as MD5 and SHA-1 is based on the iterations of compression function by Merkle-Damgård construction method ...
Harshvardhan Tiwari
doaj +1 more source
A trust‐based mechanism for drones in smart cities
Abstract Smart cities equipped with intelligent devices can enhance the lifestyle and quality of humans by automatically and collaboratively acting as a sustainable resource to the ecosystem. In addition, the technological advancement can be further empowered by interconnecting various types of technologies, such as IoT, Artificial Intelligence, drones
Geetanjali Rathee+3 more
wiley +1 more source
Cryptographic Hash Functions and Attacks – A Detailed Study
The term hash function has been used in computer science from quite some time and it refers to a function that compresses a string of arbitrary input to a string of fixed length.
Ritu Kundu, A. Dutta
semanticscholar +1 more source
‘Lex Cryptographi(c)a,’ ‘Cloud Crypto Land’ or What? – Blockchain Technology on the Legal Hype Cycle
Based on the reception of DLT/blockchain, this article argues that legal discourse is subject to hype cycle dynamics. Thinking in hype cycle categories provides a structured way for analysing the legal implications of a particular innovation. This critical engagement with enthusiasts, sceptics and pragmatists through the different stages may help to ...
Michael Anderson Schillig
wiley +1 more source
Are cryptocurrencies homogeneous?
Abstract This article investigates if cryptocurrencies returns' are similarly affected by a selection of demand‐ and supply‐side determinants. Homogeneity among cryptocurrencies is tested via a least absolute shrinkage and selection operator (LASSO) model where determinants of Bitcoin returns are applied to a sample of 12 cryptocurrencies. The analysis
Elias Bengtsson, Frida Gustafsson
wiley +1 more source
A Cryptographic Iterative Hash Function Scheme for Wireless Sensor Network (WSNs) Security Enhancement for Sensor Data Transmission in Blockchain [PDF]
Mohammed Rajhi
+5 more sources