Results 51 to 60 of about 34,780 (224)

Quantum authentication of classical messages

open access: yes, 2001
Although key distribution is arguably the most studied context on which to apply quantum cryptographic techniques, message authentication, i.e., certifying the identity of the message originator and the integrity of the message sent, can also benefit ...
Curty, Marcos, Santos, David J.
core   +1 more source

PROPOSING A NEW METHOD FOR ENCRYPTING SATELLITE IMAGES BASED ON HASH FUNCTION AND CHAOS PARAMETERS [PDF]

open access: yesThe International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences, 2019
Due to the importance of providing security in satellite imagery and their transmission, in this paper, a new method for encrypting satellite images based on Hash key-based symmetric cryptographic algorithm is proposed which is developed by combining the
M. Sedighi, S. K. Mahmoudi, A. S. Amini
doaj   +1 more source

GOTCHA Password Hackers! [PDF]

open access: yes, 2013
We introduce GOTCHAs (Generating panOptic Turing Tests to Tell Computers and Humans Apart) as a way of preventing automated offline dictionary attacks against user selected passwords.
Baddeley A.   +6 more
core   +1 more source

Secure Parallel Image Cryptographic Hash Function Using a Novel 2D High-Randomness Hyperchaotic Map

open access: yesMathematics
For image data, the processing of each pixel using a cryptographic hash function is linear, and the existing cryptographic hash function lacks parallel processing of image width and height.
Mingrui Qi, Dongdong Wang
doaj   +1 more source

Building Secure and Fast Cryptographic Hash Functions Using Programmable Cellular Automata

open access: yesJournal of Computing and Information Technology, 2015
Cryptographic hash functions have recently brought an exceptional research interest. With the increasing number of attacks against the widely used functions as MD5, SHA-1 and RIPEMD, the need to consider new hash functions design and conception strategies becomes crucial.
Kamel Mohamed Faraoun   +1 more
openaire   +2 more sources

Related Randomness Attacks for Public Key Encryption [PDF]

open access: yes, 2014
. Several recent and high-profile incidents give cause to believe that randomness failures of various kinds are endemic in deployed cryptographic systems.
Paterson, Kenneth G.   +2 more
core   +2 more sources

Integrity verification for digital Holy Quran verses using cryptographic hash function and compression

open access: yesJournal of King Saud University: Computer and Information Sciences, 2020
Data Integrity is one of the primary concepts in information security. The main task of the cryptographic hash function is to assure the integrity of the transmitted data.
Mishal Almazrooie   +5 more
doaj  

Analysis of the Cryptographic Hash function in block chains and its impact on the security of data transactions

open access: yes, 2018
A hash, as cryptographic functions are commonly known - can be defined as a mathematical algorithm capable of converting any data block into a new collection of characters with a specific size, regardless of the number of characters of the initial data ;
J. M. C. Lovelle, Y. Gutiérrez
semanticscholar   +1 more source

A research on the impact of encryption algorithms on the quality of VPN tunnels’ transmission

open access: yesITM Web of Conferences, 2018
The following article presents the results on the impact of encryption algorithms and the cryptographic hash function on the QoS (Quality of Service) transmission in a computer network.
Strzęciwilk Dariusz   +3 more
doaj   +1 more source

Haraka v2 – Efficient Short-Input Hashing for Post-Quantum Applications

open access: yesIACR Transactions on Symmetric Cryptology, 2017
Recently, many efficient cryptographic hash function design strategies have been explored, not least because of the SHA-3 competition. These designs are, almost exclusively, geared towards high performance on long inputs.
Stefan Kölbl   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy