Results 61 to 70 of about 2,695,884 (227)

Spatiotemporal chaotic one-way Hash function construction based on coupled tent maps

open access: yesTongxin xuebao, 2007
A novel coupled tent maps-based spatiotemporal chaotic cryptographic Hash function was proposed.Compared with the discrete tent map,the coupled discrete tent spatiotemporal chaotic maps have longer computer-realization-period,nearly uniform distribution ...
LIU Jian-dong, FU Xiu-li
doaj   +2 more sources

Cuckoo Hashing in Cryptography: Optimal Parameters, Robustness and Applications [PDF]

open access: yesarXiv, 2023
Cuckoo hashing is a powerful primitive that enables storing items using small space with efficient querying. At a high level, cuckoo hashing maps $n$ items into $b$ entries storing at most $\ell$ items such that each item is placed into one of $k$ randomly chosen entries. Additionally, there is an overflow stash that can store at most $s$ items.
arxiv  

An SHA-3 Hardware Architecture against Failures Based on Hamming Codes and Triple Modular Redundancy

open access: yesSensors, 2022
Cryptography has become one of the vital disciplines for information technology such as IoT (Internet Of Things), IIoT (Industrial Internet Of Things), I4.0 (Industry 4.0), and automotive applications.
Alan Torres-Alvarado   +5 more
doaj   +1 more source

Random Bit Generator Mechanism Based on Elliptic Curves and Secure Hash Function [PDF]

open access: yesarXiv, 2020
Pseudorandom bit generators (PRBG) can be designed to take the advantage of some hard number theoretic problems such as the discrete logarithm problem (DLP). Such type of generators will have good randomness and unpredictability properties as it is so difficult to find an easy solution to the regarding mathematical dilemma.
arxiv  

Blockchain for Peer‐to‐Peer Energy Trading in Electric Vehicle Charging Stations With Constrained Power Distribution and Urban Transportation Networks

open access: yesEnergy Internet, EarlyView.
ABSTRACT The proliferation of distributed energy resources (DERs) and the large‐scale electrification of transportation are driving forces behind the ongoing evolution for transforming traditionally passive consumers into prosumers (both consumers and producers) in coordinated power distribution network (PDN) and urban transportation network (UTN).
Matin Farhoumandi   +3 more
wiley   +1 more source

A Novel Improvement With an Effective Expansion to Enhance the MD5 Hash Function for Verification of a Secure E-Document

open access: yesIEEE Access, 2020
MD5 is a one-way cryptographic function used in various fields for maintaining data integrity. The application of a Hash function can provide much protection and privacy and subsequently reduce data usage.
Ammar Mohammed Ali, Alaa Kadhim Farhan
doaj   +1 more source

A Novel Hardware Architecture for Enhancing the Keccak Hash Function in FPGA Devices

open access: yesInformation, 2023
Hash functions are an essential mechanism in today’s world of information security. It is common practice to utilize them for storing and verifying passwords, developing pseudo-random sequences, and deriving keys for various applications, including ...
Argyrios Sideris   +2 more
doaj   +1 more source

A Hash of Hash Functions [PDF]

open access: yesarXiv, 2003
In this paper, we present a general review of hash functions in a cryptographic sense. We give special emphasis on some particular topics such as cipher block chaining message authentication code (CBC MAC) and its variants. This paper also broadens the information given in some well known surveys, by including more details on block-cipher based hash ...
arxiv  

On the (Im)plausibility of Public-Key Quantum Money from Collision-Resistant Hash Functions [PDF]

open access: yesarXiv, 2023
Public-key quantum money is a cryptographic proposal for using highly entangled quantum states as currency that is publicly verifiable yet resistant to counterfeiting due to the laws of physics. Despite significant interest, constructing provably-secure public-key quantum money schemes based on standard cryptographic assumptions has remained an elusive
arxiv  

Asymmetric cryptography and practical security

open access: yesJournal of Telecommunications and Information Technology, 2002
Since the appearance of public-key cryptography in Diffie-Hellman seminal paper, many schemes have been proposed, but many have been broken. Indeed, for many people, the simple fact that a cryptographic algorithm withstands cryptanalytic attacks for ...
David Pointcheval
doaj   +1 more source

Home - About - Disclaimer - Privacy