Results 41 to 50 of about 34,780 (224)
Analysis of the Cryptographic Tools for Blockchain and Bitcoin
Blockchain is one of the most interesting emerging technologies nowadays, with applications ranging from cryptocurrencies to smart contracts. This paper presents a review of the cryptographic tools necessary to understand the fundamentals of this ...
Víctor Gayoso Martínez+2 more
doaj +1 more source
Transparent code authentication at the processor level [PDF]
The authors present a lightweight authentication mechanism that verifies the authenticity of code and thereby addresses the virus and malicious code problems at the hardware level eliminating the need for trusted extensions in the operating system.
A.O. Durahim+32 more
core +2 more sources
Password protection in IT systems [PDF]
The aim of the article is to systematise the methods of securing static passwords stored in IT systems. Pros and cons of those methods are presented and conclusions as a recommendation for IT system designers are proposed.
Przemysław Rodwald, Bartosz Biernacik
doaj +1 more source
HORSIC+: An Efficient Post-Quantum Few-Time Signature Scheme
It is well known that conventional digital signature algorithms such as RSA and ECDSA are vulnerable to quantum computing attacks. Hash-based signature schemes are attractive as post-quantum signature schemes in that it is possible to calculate the ...
Jaeheung Lee, Yongsu Park
doaj +1 more source
Exploring Cryptographic Primitives and Secure Hash Functions: A Comprehensive Overview
Pages: 10 References ...
openaire +2 more sources
Formally based semi-automatic implementation of an open security protocol [PDF]
International audienceThis paper presents an experiment in which an implementation of the client side of the SSH Transport Layer Protocol (SSH-TLP) was semi-automatically derived according to a model-driven development paradigm that leverages formal ...
Alfredo Pironti+37 more
core +3 more sources
Development of a New Post-Quantum Digital Signature Algorithm: Syrga-1
The distinguishing feature of hash-based algorithms is their high confidence in security. When designing electronic signature schemes, proofs of security reduction to certain properties of cryptographic hash functions are used.
Kunbolat Algazy+3 more
doaj +1 more source
Denial-of-Service Resistance in Key Establishment [PDF]
Denial of Service (DoS) attacks are an increasing problem for network connected systems. Key establishment protocols are applications that are particularly vulnerable to DoS attack as they are typically required to perform computationally expensive ...
Boyd, Colin+4 more
core +2 more sources
In-Memory Computation Based Mapping of Keccak-f Hash Function
Cryptographic hash functions play a central role in data security for applications such as message authentication, data verification, and detecting malicious or illegal modification of data.
Sandeep Kaur Kingra+2 more
doaj +1 more source
A Survey: Cryptographic Hash Functions for Digital Stamping
The current study aims to examine a general overview of the application of hash functions in cryptography and study the relationships between cryptographic hash functions and uses of the digital signature.
I. Salem, Adil M. Salman, Maad M. Mijwil
semanticscholar +1 more source