Results 41 to 50 of about 34,780 (224)

Analysis of the Cryptographic Tools for Blockchain and Bitcoin

open access: yesMathematics, 2020
Blockchain is one of the most interesting emerging technologies nowadays, with applications ranging from cryptocurrencies to smart contracts. This paper presents a review of the cryptographic tools necessary to understand the fundamentals of this ...
Víctor Gayoso Martínez   +2 more
doaj   +1 more source

Transparent code authentication at the processor level [PDF]

open access: yes, 2009
The authors present a lightweight authentication mechanism that verifies the authenticity of code and thereby addresses the virus and malicious code problems at the hardware level eliminating the need for trusted extensions in the operating system.
A.O. Durahim   +32 more
core   +2 more sources

Password protection in IT systems [PDF]

open access: yesBiuletyn Wojskowej Akademii Technicznej, 2018
The aim of the article is to systematise the methods of securing static passwords stored in IT systems. Pros and cons of those methods are presented and conclusions as a recommendation for IT system designers are proposed.
Przemysław Rodwald, Bartosz Biernacik
doaj   +1 more source

HORSIC+: An Efficient Post-Quantum Few-Time Signature Scheme

open access: yesApplied Sciences, 2021
It is well known that conventional digital signature algorithms such as RSA and ECDSA are vulnerable to quantum computing attacks. Hash-based signature schemes are attractive as post-quantum signature schemes in that it is possible to calculate the ...
Jaeheung Lee, Yongsu Park
doaj   +1 more source

Formally based semi-automatic implementation of an open security protocol [PDF]

open access: yes, 2012
International audienceThis paper presents an experiment in which an implementation of the client side of the SSH Transport Layer Protocol (SSH-TLP) was semi-automatically derived according to a model-driven development paradigm that leverages formal ...
Alfredo Pironti   +37 more
core   +3 more sources

Development of a New Post-Quantum Digital Signature Algorithm: Syrga-1

open access: yesComputers
The distinguishing feature of hash-based algorithms is their high confidence in security. When designing electronic signature schemes, proofs of security reduction to certain properties of cryptographic hash functions are used.
Kunbolat Algazy   +3 more
doaj   +1 more source

Denial-of-Service Resistance in Key Establishment [PDF]

open access: yes, 2007
Denial of Service (DoS) attacks are an increasing problem for network connected systems. Key establishment protocols are applications that are particularly vulnerable to DoS attack as they are typically required to perform computationally expensive ...
Boyd, Colin   +4 more
core   +2 more sources

In-Memory Computation Based Mapping of Keccak-f Hash Function

open access: yesFrontiers in Nanotechnology, 2022
Cryptographic hash functions play a central role in data security for applications such as message authentication, data verification, and detecting malicious or illegal modification of data.
Sandeep Kaur Kingra   +2 more
doaj   +1 more source

A Survey: Cryptographic Hash Functions for Digital Stamping

open access: yesJournal of Southwest Jiaotong University, 2019
The current study aims to examine a general overview of the application of hash functions in cryptography and study the relationships between cryptographic hash functions and uses of the digital signature.
I. Salem, Adil M. Salman, Maad M. Mijwil
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy