Results 31 to 40 of about 34,780 (224)
Cryptographic Hash Functions and Attacks – A Detailed Study
The term hash function has been used in computer science from quite some time and it refers to a function that compresses a string of arbitrary input to a string of fixed length.
Ritu Kundu, A. Dutta
semanticscholar +1 more source
Secure communication is important for Internet of Things (IoT) applications, to avoid cyber-security attacks. One of the key security aspects is data integrity, which can be protected by employing cryptographic hash functions.
Wai-Kong Lee+5 more
doaj +1 more source
Ramanujan graphs in cryptography [PDF]
In this paper we study the security of a proposal for Post-Quantum Cryptography from both a number theoretic and cryptographic perspective. Charles-Goren-Lauter in 2006 [CGL06] proposed two hash functions based on the hardness of finding paths in ...
Costache, Anamaria+4 more
core +2 more sources
Performance and Limitation Review of Secure Hash Function Algorithm [PDF]
A cryptographic hash work is a phenomenal class of hash work that has certain properties which make it fitting for use in cryptography. It is a numerical figuring that maps information of emotional size to a bit string of a settled size (a hash) and is ...
Chetty, Tejasvini, Malviya, Iti
core +2 more sources
Hash-based signatures for the internet of things [PDF]
While numerous digital signature schemes exist in the literature, most real-world system rely on RSA-based signature schemes or on the digital signature algorithm (DSA), including its elliptic curve cryptography variant ECDSA.
Hülsing A.+4 more
core +1 more source
An Enhanced Blockchain-Based IoT Digital Forensics Architecture Using Fuzzy Hash
Due to businesses’ growing use of IoT services in their day-to-day operations and the increased use of smart devices, digital forensic investigations involving such systems will need increasingly sophisticated digital evidence collection and ...
Wael A. Mahrous+2 more
doaj +1 more source
Security method of data transmission process has been growing rapidly with the science of cryptography. Cryptography can provide security services that includes security aspects like confidentiality, data integrity, authentication and non-repudiation ...
Ferraro S. Octora Ginting+2 more
semanticscholar +1 more source
Secure Cryptographic E-Auction System
The evolution of the auction market has been on the upswing throughout the years as technology evolves at an accelerating rate. With the advanced technology nowadays, digital transformation has been applied to the auction markets as a means of ...
Soo-Chin Tan, Swee-Huay Heng
doaj +1 more source
A Comparative Study Between RIPEMD160 and SHA256 Hash Functions On Digital Holy Quran Integrity Verification [PDF]
In Data Security and Cryptography areas, hash functions play a fundamental and important role in the field of Integrity, This paper presents a performance evaluation of two cryptographic hash functions SHA256 and RIPEMD160 which used to verify the ...
Al-Aidroos, N.M., Baqtian, H.S.
core +1 more source
Deck-Based Wide Block Cipher Modes and an Exposition of the Blinded Keyed Hashing Model
We present two tweakable wide block cipher modes from doubly-extendable cryptographic keyed (deck) functions and a keyed hash function: double-decker and docked-double-decker.
Aldo Gunsing, Joan Daemen, Bart Mennink
doaj +1 more source