Results 81 to 90 of about 2,732,642 (253)
ABSTRACT The proliferation of distributed energy resources (DERs) and the large‐scale electrification of transportation are driving forces behind the ongoing evolution for transforming traditionally passive consumers into prosumers (both consumers and producers) in coordinated power distribution network (PDN) and urban transportation network (UTN).
Matin Farhoumandi+3 more
wiley +1 more source
Random Bit Generator Mechanism Based on Elliptic Curves and Secure Hash Function [PDF]
Pseudorandom bit generators (PRBG) can be designed to take the advantage of some hard number theoretic problems such as the discrete logarithm problem (DLP). Such type of generators will have good randomness and unpredictability properties as it is so difficult to find an easy solution to the regarding mathematical dilemma.
arxiv
An SHA-3 Hardware Architecture against Failures Based on Hamming Codes and Triple Modular Redundancy
Cryptography has become one of the vital disciplines for information technology such as IoT (Internet Of Things), IIoT (Industrial Internet Of Things), I4.0 (Industry 4.0), and automotive applications.
Alan Torres-Alvarado+5 more
doaj +1 more source
Overview of blockchain technology cryptographic security [PDF]
This thesis work is aimed at developing understanding of the hash functions and algorithms being used in blockchain technologies Bitcoin in comparison to Ethereum and private blockchain hash functions.
Nwachukwu, Uchechukwu
core
MD5 is a one-way cryptographic function used in various fields for maintaining data integrity. The application of a Hash function can provide much protection and privacy and subsequently reduce data usage.
Ammar Mohammed Ali, Alaa Kadhim Farhan
doaj +1 more source
A Hash of Hash Functions [PDF]
In this paper, we present a general review of hash functions in a cryptographic sense. We give special emphasis on some particular topics such as cipher block chaining message authentication code (CBC MAC) and its variants. This paper also broadens the information given in some well known surveys, by including more details on block-cipher based hash ...
arxiv
On the (Im)plausibility of Public-Key Quantum Money from Collision-Resistant Hash Functions [PDF]
Public-key quantum money is a cryptographic proposal for using highly entangled quantum states as currency that is publicly verifiable yet resistant to counterfeiting due to the laws of physics. Despite significant interest, constructing provably-secure public-key quantum money schemes based on standard cryptographic assumptions has remained an elusive
arxiv
Hash Gone Bad: Automated discovery of protocol attacks that exploit hash function weaknesses [PDF]
Most cryptographic protocols use cryptographic hash functions as a building block. The security analyses of these protocols typically assume that the hash functions are perfect (such as in the random oracle model).
Cheval, Vincent+5 more
core
Quantum hashing is maximally secure against classical leakage [PDF]
Cryptographic hash functions are fundamental primitives widely used in practice. For such a function $f:\{0, 1\}^n\to\{0, 1\}^m$, it is nearly impossible for an adversary to produce the hash $f(x)$ without knowing the secret message $x\in\{0, 1\}^n$.
arxiv
Verification of SHA-256 and MD5 Hash Functions Using UVM [PDF]
Data integrity assurance and data origin authentication are important security aspects in commerce, financial transfer, banking, software, email, data storage, etc.
Bashkaran, Dinesh Anand
core +1 more source