Results 31 to 40 of about 2,695,884 (227)

A secure and efficient cryptographic hash function based on NewFORK-256

open access: yesEgyptian Informatics Journal, 2012
Cryptographic hash functions serve as a fundamental building block of information security and are used in numerous security applications and protocols such as digital signature schemes, construction of MAC and random number generation, for ensuring data
Harshvardhan Tiwari, Krishna Asawa
doaj   +1 more source

An Enhanced Blockchain-Based IoT Digital Forensics Architecture Using Fuzzy Hash

open access: yesIEEE Access, 2021
Due to businesses’ growing use of IoT services in their day-to-day operations and the increased use of smart devices, digital forensic investigations involving such systems will need increasingly sophisticated digital evidence collection and ...
Wael A. Mahrous   +2 more
doaj   +1 more source

Secure big data collection and processing: Framework, means and opportunities

open access: yesJournal of the Royal Statistical Society: Series A (Statistics in Society), Volume 185, Issue 4, Page 1541-1559, October 2022., 2022
Abstract Statistical disclosure control is important for the dissemination of statistical outputs. There is an increasing need for greater confidentiality protection during data collection and processing by National Statistical Offices. In particular, various transactions and remote sensing signals are examples of useful but very detailed big data that
Li‐Chun Zhang, Gustav Haraldsen
wiley   +1 more source

Digital Signature Standard Implementation Strategy by Optimizing Hash Functions Through Performance Optimization

open access: yesJournal of Accounting and Finance Management, 2023
Security method of data transmission process has been growing rapidly with the science of cryptography. Cryptography can provide security services that includes security aspects like confidentiality, data integrity, authentication and non-repudiation ...
Ferraro S. Octora Ginting   +2 more
semanticscholar   +1 more source

Secure Cryptographic E-Auction System

open access: yesInternational Journal of Technology, 2022
The evolution of the auction market has been on the upswing throughout the years as technology evolves at an accelerating rate. With the advanced technology nowadays, digital transformation has been applied to the auction markets as a means of ...
Soo-Chin Tan, Swee-Huay Heng
doaj   +1 more source

Deck-Based Wide Block Cipher Modes and an Exposition of the Blinded Keyed Hashing Model

open access: yesIACR Transactions on Symmetric Cryptology, 2020
We present two tweakable wide block cipher modes from doubly-extendable cryptographic keyed (deck) functions and a keyed hash function: double-decker and docked-double-decker.
Aldo Gunsing, Joan Daemen, Bart Mennink
doaj   +1 more source

Analysis of the Cryptographic Tools for Blockchain and Bitcoin

open access: yesMathematics, 2020
Blockchain is one of the most interesting emerging technologies nowadays, with applications ranging from cryptocurrencies to smart contracts. This paper presents a review of the cryptographic tools necessary to understand the fundamentals of this ...
Víctor Gayoso Martínez   +2 more
doaj   +1 more source

Regular and almost universal hashing: an efficient implementation [PDF]

open access: yesSoftware: Practice and Experience 47 (10), 2017, 2016
Random hashing can provide guarantees regarding the performance of data structures such as hash tables---even in an adversarial setting. Many existing families of hash functions are universal: given two data objects, the probability that they have the same hash value is low given that we pick hash functions at random.
arxiv   +1 more source

Password protection in IT systems [PDF]

open access: yesBiuletyn Wojskowej Akademii Technicznej, 2018
The aim of the article is to systematise the methods of securing static passwords stored in IT systems. Pros and cons of those methods are presented and conclusions as a recommendation for IT system designers are proposed.
Przemysław Rodwald, Bartosz Biernacik
doaj   +1 more source

HORSIC+: An Efficient Post-Quantum Few-Time Signature Scheme

open access: yesApplied Sciences, 2021
It is well known that conventional digital signature algorithms such as RSA and ECDSA are vulnerable to quantum computing attacks. Hash-based signature schemes are attractive as post-quantum signature schemes in that it is possible to calculate the ...
Jaeheung Lee, Yongsu Park
doaj   +1 more source

Home - About - Disclaimer - Privacy