Results 91 to 100 of about 13,790 (198)
Design of Smart and Secured Healthcare Service Using Deep Learning with Modified SHA-256 Algorithm. [PDF]
Mohanty MD +6 more
europepmc +1 more source
Questions related to Bitcoin and other Informational Money [PDF]
A collection of questions about Bitcoin and its hypothetical relatives Bitguilder and Bitpenny is formulated. These questions concern technical issues about protocols, security issues, issues about the formalizations of informational monies in various ...
Bergstra, Jan A., de Leeuw, Karl
core +1 more source
SHA-256 Collision Attack with Programmatic SAT
To appear in the 2024 Proceedings of the International Workshop on Satisfiability Checking and Symbolic ...
Alamgir, Nahiyan +2 more
openaire +2 more sources
Perbandingan Algoritma AES128 dengan SHA256 dalam Kecepatan Enkripsi Pengiriman Data
Internet of Things bekerja untuk menyediakan berbagai layanan yang menghubungkan sensor dengan aktuator. Pada masa sekarang, layanan IoT telah banyak digunakan diberbagai bidang.
Rina Setiani +4 more
doaj +1 more source
Algebraic Fault Attack on the SHA-256 Compression Function
The cryptographic hash function SHA-256 is one member of the SHA-2 hash family, which was proposed in 2000 and was standardized by NIST in 2002 as a successor of SHA-1. Although the differential fault attack on SHA-1compression function has been proposed, it seems hard to be directly adapted to SHA-256.
Ronglin Hao +3 more
openaire +1 more source
MicroCrypt: High-Efficiency Hashing for Next-Generation IoT Devices
The Internet of Things (IoT) is growing quickly and connecting more devices than ever before. This has made it more important to improve security protocols, especially cryptographic hash functions that work in places with limited computing, storage, and ...
Shatha H. Jafer Al-Khalisy +5 more
doaj +1 more source
Skyscraper: Fast Hashing on Big Primes
Arithmetic hash functions defined over prime fields have been actively developed and used in verifiable computation (VC) protocols. Among those, ellipticcurve- based SNARKs require large (256-bit and higher) primes. Such hash functions are notably slow,
Clémence Bouvier +6 more
doaj +1 more source
Tamper‐aware authentication framework for wireless sensor networks
Sensor nodes once deployed onto the field are mostly provided with little or no attention making them prone to physical attacks by adversaries. Various security frameworks have been proposed to mitigate tampering; others also ensure authentication of ...
Henry Nunoo‐Mensah +2 more
doaj +1 more source
Perancangan Aplikasi Duplicate Video Scanner Menerapkan Algoritma Sha-256
In this increasingly advanced era, new technologies that have never been imagined before are increasingly emerging, starting from the emergence of computers, cellphones, and many more. One of the emerging technologies is MPEG4 (Moving Picture Expert Group)-4 Video Player 3 or better known as MP4.
openaire +1 more source
AN EFFICIENT HASH ALGORITHM TO PRESERVE DATA INTEGRITY [PDF]
Recent advancements in the field of electronic commerce and internet banking have led to the growing need for a secure communication system. Various other areas including military require a highly reliable system so as to make sure that the shared data ...
GURPREET K. SODHI, GURJOT S. GABA
doaj

