Results 31 to 40 of about 34,780 (224)

Cryptographic Hash Functions and Attacks – A Detailed Study

open access: yesInternational Journal of Advanced Research in Computer Science, 2020
The term hash function has been used in computer science from quite some time and it refers to a function that compresses a string of arbitrary input to a string of fixed length.
Ritu Kundu, A. Dutta
semanticscholar   +1 more source

Efficient Implementation of Lightweight Hash Functions on GPU and Quantum Computers for IoT Applications

open access: yesIEEE Access, 2022
Secure communication is important for Internet of Things (IoT) applications, to avoid cyber-security attacks. One of the key security aspects is data integrity, which can be protected by employing cryptographic hash functions.
Wai-Kong Lee   +5 more
doaj   +1 more source

Ramanujan graphs in cryptography [PDF]

open access: yes, 2018
In this paper we study the security of a proposal for Post-Quantum Cryptography from both a number theoretic and cryptographic perspective. Charles-Goren-Lauter in 2006 [CGL06] proposed two hash functions based on the hardness of finding paths in ...
Costache, Anamaria   +4 more
core   +2 more sources

Performance and Limitation Review of Secure Hash Function Algorithm [PDF]

open access: yes, 2019
A cryptographic hash work is a phenomenal class of hash work that has certain properties which make it fitting for use in cryptography. It is a numerical figuring that maps information of emotional size to a bit string of a settled size (a hash) and is ...
Chetty, Tejasvini, Malviya, Iti
core   +2 more sources

Hash-based signatures for the internet of things [PDF]

open access: yes, 2018
While numerous digital signature schemes exist in the literature, most real-world system rely on RSA-based signature schemes or on the digital signature algorithm (DSA), including its elliptic curve cryptography variant ECDSA.
Hülsing A.   +4 more
core   +1 more source

An Enhanced Blockchain-Based IoT Digital Forensics Architecture Using Fuzzy Hash

open access: yesIEEE Access, 2021
Due to businesses’ growing use of IoT services in their day-to-day operations and the increased use of smart devices, digital forensic investigations involving such systems will need increasingly sophisticated digital evidence collection and ...
Wael A. Mahrous   +2 more
doaj   +1 more source

Digital Signature Standard Implementation Strategy by Optimizing Hash Functions Through Performance Optimization

open access: yesJournal of Accounting and Finance Management, 2023
Security method of data transmission process has been growing rapidly with the science of cryptography. Cryptography can provide security services that includes security aspects like confidentiality, data integrity, authentication and non-repudiation ...
Ferraro S. Octora Ginting   +2 more
semanticscholar   +1 more source

Secure Cryptographic E-Auction System

open access: yesInternational Journal of Technology, 2022
The evolution of the auction market has been on the upswing throughout the years as technology evolves at an accelerating rate. With the advanced technology nowadays, digital transformation has been applied to the auction markets as a means of ...
Soo-Chin Tan, Swee-Huay Heng
doaj   +1 more source

A Comparative Study Between RIPEMD160 and SHA256 Hash Functions On Digital Holy Quran Integrity Verification [PDF]

open access: yes, 2022
In Data Security and Cryptography areas, hash functions play a fundamental and important role in the field of Integrity, This paper presents a performance evaluation of two cryptographic hash functions SHA256 and RIPEMD160 which used to verify the ...
Al-Aidroos, N.M., Baqtian, H.S.
core   +1 more source

Deck-Based Wide Block Cipher Modes and an Exposition of the Blinded Keyed Hashing Model

open access: yesIACR Transactions on Symmetric Cryptology, 2020
We present two tweakable wide block cipher modes from doubly-extendable cryptographic keyed (deck) functions and a keyed hash function: double-decker and docked-double-decker.
Aldo Gunsing, Joan Daemen, Bart Mennink
doaj   +1 more source

Home - About - Disclaimer - Privacy