Results 31 to 40 of about 46,179 (288)

New hash function based on C-MD structure and chaotic neural network

open access: yes网络与信息安全学报, 2023
In recent years, widely used hash algorithms such as MD5 and SHA-1 have been found to have varying degrees of security risks.The iterative structure of the SHA-2 algorithm is similar to that of SHA-1, making it vulnerable to attacks as well.Meanwhile ...
Liquan CHEN   +4 more
doaj   +3 more sources

Freestart Collision for Full SHA-1 [PDF]

open access: yes, 2016
This article presents an explicit freestart colliding pair for SHA-1, i.e. a collision for its internal compression function. This is the first practical break of the full SHA-1, reaching all 80 out of 80 steps. Only 10 days of computation on a 64-GPU cluster were necessary to perform this attack, for a runtime cost equivalent to approximately 2^{57.5}
Stevens, Marc   +2 more
openaire   +1 more source

SAFIUS - A secure and accountable filesystem over untrusted storage [PDF]

open access: yes, 2007
We describe SAFIUS, a secure accountable file system that resides over an untrusted storage. SAFIUS provides strong security guarantees like confidentiality, integrity, prevention from rollback attacks, and accountability.
Gopinath, K, Narayan, Ganesh, Sriram, V
core   +2 more sources

Kode Autentikasi Hash pada Pesan Teks Berbasis Android

open access: yesJurnal Eksplora Informatika, 2018
Autentikasi merupakan hal yang sangat penting dalam pengiriman informasi baik berbentuk data ataupun pesan teks. Hal ini dikarenakan dibutuhkan autentikasi terhadap keaslian dan keutuhan data pada saat pertukaran informasi.
Yusfrizal Bin Pairin
doaj   +1 more source

Area-throughput trade-offs for SHA-1 and SHA-256 hash functions’ pipelined designs [PDF]

open access: yes, 2015
High-throughput designs of hash functions are strongly demanded due to the need for security in every transmitted packet of worldwide e-transactions. Thus, optimized and non-optimized pipelined architectures have been proposed raising, however, important
Athanasiou, George S.   +5 more
core   +3 more sources

Formally based semi-automatic implementation of an open security protocol [PDF]

open access: yes, 2012
International audienceThis paper presents an experiment in which an implementation of the client side of the SSH Transport Layer Protocol (SSH-TLP) was semi-automatically derived according to a model-driven development paradigm that leverages formal ...
Alfredo Pironti   +37 more
core   +3 more sources

An API for IPv6 Multihoming [PDF]

open access: yes, 2006
IFIP International Workshop on Networked Applications, Colmenarejo, Madrid/Spain, 6?8 July, 2005This paper proposes an API for Multihoming in IPv6. This API is based on the Hash Based Addresses and Cryptographically Generated Addresses approaches, which ...
Bagnulo Braun, Marcelo Gabriel   +2 more
core   +2 more sources

The First Collision for Full SHA-1 [PDF]

open access: yes, 2017
SHA-1 is a widely used 1995 NIST cryptographic hash function standard that was officially deprecated by NIST in 2011 due to fundamental security weaknesses demonstrated in various analyses and theoretical attacks.
Marc Stevens   +4 more
openaire   +1 more source

Improved Quantum Cryptanalysis of MD5 and SHA-1

open access: yesIEEE Access
MD5 and SHA-1 are widely studied hash functions in cryptanalysis, owing to their well-structured round functions and historical significance in cryptography.
Kyungbae Jang   +2 more
doaj   +1 more source

New Preimage Attacks against Reduced SHA-1 [PDF]

open access: yes, 2012
This paper shows preimage attacks against reduced SHA-1 up to 57 steps. The best previous attack has been presented at CRYPTO 2009 and was for 48 steps finding a two-block preimage with incorrect padding at the cost of $$2^{159.3}$$ evaluations of the compression function.
Simon Knellwolf, Dmitry Khovratovich
openaire   +1 more source

Home - About - Disclaimer - Privacy