Results 31 to 40 of about 37,820 (242)
Secure Authentication with Short Re-Usable Passwords [PDF]
We present Knock Yourself Out (KYO), a password generator that enables secure authentication against a computationally unbounded adversary. Master passwords can be surprisingly short and may be re-used for multiple service accounts even in the event ...
Güldenring, Benjamin +2 more
core +1 more source
An Enhanced Blockchain-Based IoT Digital Forensics Architecture Using Fuzzy Hash
Due to businesses’ growing use of IoT services in their day-to-day operations and the increased use of smart devices, digital forensic investigations involving such systems will need increasingly sophisticated digital evidence collection and ...
Wael A. Mahrous +2 more
doaj +1 more source
Key derivation function: key-hash based computational extractor and stream based pseudorandom expander [PDF]
The key derivation function is a specific cryptographic algorithm that transforms private string and public strings into one or more cryptographic keys.
Chai Wen Chuah +2 more
doaj +2 more sources
Quantum authentication of classical messages
Although key distribution is arguably the most studied context on which to apply quantum cryptographic techniques, message authentication, i.e., certifying the identity of the message originator and the integrity of the message sent, can also benefit ...
Curty, Marcos, Santos, David J.
core +1 more source
On Cryptographic Hash Functions: Definitions, Ideas and Practical Cryptographic Attacks [PDF]
openHash functions, and cryptographic hash functions in particular, underpin the technologies on which modern life is built. Efficient databases, the Internet, the World Wide Web, online payments and more, would not be possible without the security and ...
DALLATORRE, FILIPPO
core
Security method of data transmission process has been growing rapidly with the science of cryptography. Cryptography can provide security services that includes security aspects like confidentiality, data integrity, authentication and non-repudiation ...
Ferraro S. Octora Ginting +2 more
semanticscholar +1 more source
Development of a New Post-Quantum Digital Signature Algorithm: Syrga-1
The distinguishing feature of hash-based algorithms is their high confidence in security. When designing electronic signature schemes, proofs of security reduction to certain properties of cryptographic hash functions are used.
Kunbolat Algazy +3 more
doaj +1 more source
Provably secure keyless hash function uses Random Oracle (RO) or Sponge principles for the design and construction of security-centric hash algorithms. It capitalizes the aforesaid principles to produce outcomes like MD2, MD5, SHA-160, SHA-224/256, SHA ...
P. Karthik, P. Shanthi Bala
doaj +1 more source
Trusted-HB: a low-cost version of HB+ secure against Man-in-The-Middle attacks [PDF]
Since the introduction at Crypto'05 by Juels and Weis of the protocol HB+, a lightweight protocol secure against active attacks but only in a detection based-model, many works have tried to enhance its security.
Bringer, Julien, Chabanne, Herve
core +2 more sources
Secure Cryptographic E-Auction System
The evolution of the auction market has been on the upswing throughout the years as technology evolves at an accelerating rate. With the advanced technology nowadays, digital transformation has been applied to the auction markets as a means of ...
Soo-Chin Tan, Swee-Huay Heng
doaj +1 more source

