Results 41 to 50 of about 32,597 (206)

Deck-Based Wide Block Cipher Modes and an Exposition of the Blinded Keyed Hashing Model

open access: yesIACR Transactions on Symmetric Cryptology, 2020
We present two tweakable wide block cipher modes from doubly-extendable cryptographic keyed (deck) functions and a keyed hash function: double-decker and docked-double-decker.
Aldo Gunsing, Joan Daemen, Bart Mennink
doaj   +1 more source

Quantum authentication of classical messages

open access: yes, 2001
Although key distribution is arguably the most studied context on which to apply quantum cryptographic techniques, message authentication, i.e., certifying the identity of the message originator and the integrity of the message sent, can also benefit ...
Curty, Marcos, Santos, David J.
core   +1 more source

Secure Authentication with Short Re-Usable Passwords [PDF]

open access: yes, 2015
We present Knock Yourself Out (KYO), a password generator that enables secure authentication against a computationally unbounded adversary. Master passwords can be surprisingly short and may be re-used for multiple service accounts even in the event ...
Güldenring, Benjamin   +2 more
core   +1 more source

Development of a New Post-Quantum Digital Signature Algorithm: Syrga-1

open access: yesComputers
The distinguishing feature of hash-based algorithms is their high confidence in security. When designing electronic signature schemes, proofs of security reduction to certain properties of cryptographic hash functions are used.
Kunbolat Algazy   +3 more
doaj   +1 more source

Analysis of the Cryptographic Tools for Blockchain and Bitcoin

open access: yesMathematics, 2020
Blockchain is one of the most interesting emerging technologies nowadays, with applications ranging from cryptocurrencies to smart contracts. This paper presents a review of the cryptographic tools necessary to understand the fundamentals of this ...
Víctor Gayoso Martínez   +2 more
doaj   +1 more source

Password protection in IT systems [PDF]

open access: yesBiuletyn Wojskowej Akademii Technicznej, 2018
The aim of the article is to systematise the methods of securing static passwords stored in IT systems. Pros and cons of those methods are presented and conclusions as a recommendation for IT system designers are proposed.
Przemysław Rodwald, Bartosz Biernacik
doaj   +1 more source

Efficient hardware implementations of high throughput SHA-3 candidates keccak, luffa and blue midnight wish for single- and multi-message hashing [PDF]

open access: yes, 2010
In November 2007 NIST announced that it would organize the SHA-3 competition to select a new cryptographic hash function family by 2012. In the selection process, hardware performances of the candidates will play an important role.
Akın, Abdulkadir   +6 more
core   +2 more sources

HORSIC+: An Efficient Post-Quantum Few-Time Signature Scheme

open access: yesApplied Sciences, 2021
It is well known that conventional digital signature algorithms such as RSA and ECDSA are vulnerable to quantum computing attacks. Hash-based signature schemes are attractive as post-quantum signature schemes in that it is possible to calculate the ...
Jaeheung Lee, Yongsu Park
doaj   +1 more source

A Cryptographic Escrow for Treaty Declarations and Step-by-Step Verification

open access: yes, 2018
The verification of arms-control and disarmament agreements requires states to provide declarations, including information on sensitive military sites and assets.
Felten, Edward W.   +2 more
core   +1 more source

Multi‐Level Optical Physical Unclonable Function Based on Random Surface Scattering for Hierarchical Cryptographic Protocols

open access: yesAdvanced Science, EarlyView.
This study proposed physical unclonable function based multi‐level key space generation scheme. By exploiting speckle characteristic, a size‐controllable structure is achieved and that is suitable foundation for multiple key extraction. The flexible key space supports various specifications for advanced applications, such as hierarchical authentication
Jeong Jin Kim, Min Seong Kim, Gil Ju Lee
wiley   +1 more source

Home - About - Disclaimer - Privacy