Results 91 to 100 of about 13,790 (198)

Design of Smart and Secured Healthcare Service Using Deep Learning with Modified SHA-256 Algorithm. [PDF]

open access: yesHealthcare (Basel), 2022
Mohanty MD   +6 more
europepmc   +1 more source

Questions related to Bitcoin and other Informational Money [PDF]

open access: yes, 2013
A collection of questions about Bitcoin and its hypothetical relatives Bitguilder and Bitpenny is formulated. These questions concern technical issues about protocols, security issues, issues about the formalizations of informational monies in various ...
Bergstra, Jan A., de Leeuw, Karl
core   +1 more source

SHA-256 Collision Attack with Programmatic SAT

open access: yes
To appear in the 2024 Proceedings of the International Workshop on Satisfiability Checking and Symbolic ...
Alamgir, Nahiyan   +2 more
openaire   +2 more sources

Perbandingan Algoritma AES128 dengan SHA256 dalam Kecepatan Enkripsi Pengiriman Data

open access: yesJOINS (Journal of Information System)
Internet of Things bekerja untuk menyediakan berbagai layanan yang menghubungkan sensor dengan aktuator. Pada masa sekarang, layanan IoT telah banyak digunakan diberbagai bidang.
Rina Setiani   +4 more
doaj   +1 more source

Algebraic Fault Attack on the SHA-256 Compression Function

open access: yesInternational Journal of Research in Computer Science, 2014
The cryptographic hash function SHA-256 is one member of the SHA-2 hash family, which was proposed in 2000 and was standardized by NIST in 2002 as a successor of SHA-1. Although the differential fault attack on SHA-1compression function has been proposed, it seems hard to be directly adapted to SHA-256.
Ronglin Hao   +3 more
openaire   +1 more source

MicroCrypt: High-Efficiency Hashing for Next-Generation IoT Devices

open access: yesProceedings of the International Conference on Applied Innovations in IT
The Internet of Things (IoT) is growing quickly and connecting more devices than ever before. This has made it more important to improve security protocols, especially cryptographic hash functions that work in places with limited computing, storage, and ...
Shatha H. Jafer Al-Khalisy   +5 more
doaj   +1 more source

Skyscraper: Fast Hashing on Big Primes

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
Arithmetic hash functions defined over prime fields have been actively developed and used in verifiable computation (VC) protocols. Among those, ellipticcurve- based SNARKs require large (256-bit and higher) primes. Such hash functions are notably slow,
Clémence Bouvier   +6 more
doaj   +1 more source

Tamper‐aware authentication framework for wireless sensor networks

open access: yesIET Wireless Sensor Systems, 2017
Sensor nodes once deployed onto the field are mostly provided with little or no attention making them prone to physical attacks by adversaries. Various security frameworks have been proposed to mitigate tampering; others also ensure authentication of ...
Henry Nunoo‐Mensah   +2 more
doaj   +1 more source

Perancangan Aplikasi Duplicate Video Scanner Menerapkan Algoritma Sha-256

open access: yesBulletin of Artificial Intelligence, 2022
In this increasingly advanced era, new technologies that have never been imagined before are increasingly emerging, starting from the emergence of computers, cellphones, and many more. One of the emerging technologies is MPEG4 (Moving Picture Expert Group)-4 Video Player 3 or better known as MP4.
openaire   +1 more source

AN EFFICIENT HASH ALGORITHM TO PRESERVE DATA INTEGRITY [PDF]

open access: yesJournal of Engineering Science and Technology, 2018
Recent advancements in the field of electronic commerce and internet banking have led to the growing need for a secure communication system. Various other areas including military require a highly reliable system so as to make sure that the shared data ...
GURPREET K. SODHI, GURJOT S. GABA
doaj  

Home - About - Disclaimer - Privacy