Results 101 to 110 of about 13,790 (198)
Year 2010 Issues on Cryptographic Algorithms [PDF]
In the financial sector, cryptographic algorithms are used as fundamental techniques for assuring confidentiality and integrity of data used in financial transactions and for authenticating entities involved in the transactions.
Masashi Une, Masayuki Kanda
core
With the advent of large-scale data applications, the security and efficiency of cryptographic systems have become two critical concerns. In this paper we present a cryptographic solution that combines the ChaCha20 encryption algorithm and SHA-256 ...
Azhar Sadiq Jafer, Huda Najeh Abbood
doaj +1 more source
One Password: An Encryption Scheme for Hiding Users' Register Information
In recent years, the attack which leverages register information (e.g. accounts and passwords) leaked from 3rd party applications to try other applications is popular and serious. We call this attack "database collision".
Zhao, Bo, Zhou, Yu
core
An algorithm for securing user credentials by combining Encryption and Hashing method
Internet browsers, run on electronic devices usually preserve sensitive information, for example, client identifications. With present day innovation, most of the internet browsers uses password logins as an initial validation to demonstrate a client's ...
Awlad Hossain +3 more
doaj
With recent trends, the cloud-computing paradigm has gained significant attention, especially in patient health monitoring applications. To date, several cryptographic methods have been introduced to accomplish secure medical data access and storage in ...
J. Ananda Babu +5 more
doaj +1 more source
The aim of the study was to investigate the effect of antimicrobial peptides (AMPs) Hylin−a1, KR−12-a5, and Temporin-SHa in Candida albicans as well as the biocompatibility of keratinocytes spontaneously immortalized (NOK-si) and human gingival ...
Luana Mendonça Dias +6 more
doaj +1 more source
A Combination of SHA-256 and DES for Visual Data Protection
This study employs SHA-256 and DES algorithms to safeguard visual data through encryption and decryption processes. Research findings demonstrate that this method provides robust security with image histograms that are difficult to recognize and randomly
Aristides Bima Wintaka +3 more
doaj +1 more source
Strict Avalanche Criterion of SHA-256 and Sub-Function-Removed Variants
The measure of diffusion, the property of dissipating patterns and statistical structures in cryptographic transformations, serves as a valuable heuristic for assessing the obscurity of patterns that could lead to collisions.
Riley Vaughn, Mike Borowczak
doaj +1 more source
Secure Message Hashing with SHA-256: Cryptographic Implementation
Hash Functions are fundamental devices in the information security on the internet. The hash function used in various security applications are known as cryptographic hash function. The cryptographic hash function plays a crucial role in cryptography to ensure certain security objectives.
openaire +1 more source
Securing internet of things devices using a hybrid approach. [PDF]
Jenny RS +9 more
europepmc +1 more source

