Results 81 to 90 of about 2,743,596 (249)

A Hash of Hash Functions [PDF]

open access: yesarXiv, 2003
In this paper, we present a general review of hash functions in a cryptographic sense. We give special emphasis on some particular topics such as cipher block chaining message authentication code (CBC MAC) and its variants. This paper also broadens the information given in some well known surveys, by including more details on block-cipher based hash ...
arxiv  

On the (Im)plausibility of Public-Key Quantum Money from Collision-Resistant Hash Functions [PDF]

open access: yesarXiv, 2023
Public-key quantum money is a cryptographic proposal for using highly entangled quantum states as currency that is publicly verifiable yet resistant to counterfeiting due to the laws of physics. Despite significant interest, constructing provably-secure public-key quantum money schemes based on standard cryptographic assumptions has remained an elusive
arxiv  

Design and Analysis of Cryptographic Hash Functions [PDF]

open access: yes, 2016
Wydział Matematyki i InformatykiKryptograficzne funkcje haszujące stanowią element składowy wielu algorytmów kryptograficznych. Przykładowymi zastosowaniami kryptograficznych funkcji haszujących są podpisy cyfrowe oraz kody uwierzytelniania wiadomości.
Sokołowski, Przemysław
core  

Quantum hashing is maximally secure against classical leakage [PDF]

open access: yesarXiv, 2017
Cryptographic hash functions are fundamental primitives widely used in practice. For such a function $f:\{0, 1\}^n\to\{0, 1\}^m$, it is nearly impossible for an adversary to produce the hash $f(x)$ without knowing the secret message $x\in\{0, 1\}^n$.
arxiv  

Verification of SHA-256 and MD5 Hash Functions Using UVM [PDF]

open access: yes, 2019
Data integrity assurance and data origin authentication are important security aspects in commerce, financial transfer, banking, software, email, data storage, etc.
Bashkaran, Dinesh Anand
core   +1 more source

Asymmetric cryptography and practical security

open access: yesJournal of Telecommunications and Information Technology, 2002
Since the appearance of public-key cryptography in Diffie-Hellman seminal paper, many schemes have been proposed, but many have been broken. Indeed, for many people, the simple fact that a cryptographic algorithm withstands cryptanalytic attacks for ...
David Pointcheval
doaj   +1 more source

Blockchain technology disruptions: Exploring accounting and auditing academics and practitioners' perception

open access: yesAccounting &Finance, EarlyView.
Abstract This study explores the practical impact of blockchain technology (BCT), which contrasts strongly with literature that has predominantly hypothesised BCT's potential to disrupt accounting practice. We interviewed 44 practitioners and academics with knowledge of BCT across 13 countries and industries.
Musbaudeen Titilope Oladejo   +3 more
wiley   +1 more source

How to Formalize Loop Iterations in Cryptographic Protocols Using ProVerif

open access: yesIEEE Access
The formal verification of cryptographic protocols has been extensively studied in recent years. To verify the cryptographic protocol security, formal verification tools consider protocol properties as interactive processes involving a cryptographic ...
Takehiko Mieno   +3 more
doaj   +1 more source

Towards Automated Augmentation and Instrumentation of Legacy Cryptographic Executables: Extended Version [PDF]

open access: yesarXiv, 2020
Implementation flaws in cryptographic libraries, design flaws in underlying cryptographic primitives, and weaknesses in protocols using both, can all lead to exploitable vulnerabilities in software. Manually fixing such issues is challenging and resource consuming, especially when maintaining legacy software that contains broken or outdated ...
arxiv  

OpenSAFELY: The impact of COVID‐19 on azathioprine, leflunomide and methotrexate monitoring, and factors associated with change in monitoring rate

open access: yesBritish Journal of Clinical Pharmacology, EarlyView.
Aims The COVID‐19 pandemic created unprecedented pressure on healthcare services. This study investigates whether disease‐modifying antirheumatic drug (DMARD) safety monitoring was affected during the COVID‐19 pandemic. Methods A population‐based cohort study was conducted using the OpenSAFELY platform to access electronic health record data from 24.2 ...
Andrew D. Brown   +27 more
wiley   +1 more source

Home - About - Disclaimer - Privacy