Results 101 to 110 of about 13,790 (198)

Year 2010 Issues on Cryptographic Algorithms [PDF]

open access: yes
In the financial sector, cryptographic algorithms are used as fundamental techniques for assuring confidentiality and integrity of data used in financial transactions and for authenticating entities involved in the transactions.
Masashi Une, Masayuki Kanda
core  

Secure Data Management Via Lightweight Cryptographic Frameworks: A Comparative Study of ChaCha20 for Encryption and SHA-256 for Hashing Secure Using a Big Data

open access: yesProceedings of the International Conference on Applied Innovations in IT
With the advent of large-scale data applications, the security and efficiency of cryptographic systems have become two critical concerns. In this paper we present a cryptographic solution that combines the ChaCha20 encryption algorithm and SHA-256 ...
Azhar Sadiq Jafer, Huda Najeh Abbood
doaj   +1 more source

One Password: An Encryption Scheme for Hiding Users' Register Information

open access: yes, 2017
In recent years, the attack which leverages register information (e.g. accounts and passwords) leaked from 3rd party applications to try other applications is popular and serious. We call this attack "database collision".
Zhao, Bo, Zhou, Yu
core  

An algorithm for securing user credentials by combining Encryption and Hashing method

open access: yesInternational Journal of Electrical Engineering and Applied Sciences, 2020
Internet browsers, run on electronic devices usually preserve sensitive information, for example, client identifications. With present day innovation, most of the internet browsers uses password logins as an initial validation to demonstrate a client's ...
Awlad Hossain   +3 more
doaj  

Block chain enabled hybrid cryptographic algorithm for security and privacy preservation of electronic health records

open access: yesICT Express
With recent trends, the cloud-computing paradigm has gained significant attention, especially in patient health monitoring applications. To date, several cryptographic methods have been introduced to accomplish secure medical data access and storage in ...
J. Ananda Babu   +5 more
doaj   +1 more source

Antibiofilm Activity and Biocompatibility of Temporin-SHa: A Promising Antimicrobial Peptide for Control of Fluconazole-Resistant Candida albicans

open access: yesMicroorganisms
The aim of the study was to investigate the effect of antimicrobial peptides (AMPs) Hylin−a1, KR−12-a5, and Temporin-SHa in Candida albicans as well as the biocompatibility of keratinocytes spontaneously immortalized (NOK-si) and human gingival ...
Luana Mendonça Dias   +6 more
doaj   +1 more source

A Combination of SHA-256 and DES for Visual Data Protection

open access: yesJurnal Masyarakat Informatika
This study employs SHA-256 and DES algorithms to safeguard visual data through encryption and decryption processes. Research findings demonstrate that this method provides robust security with image histograms that are difficult to recognize and randomly
Aristides Bima Wintaka   +3 more
doaj   +1 more source

Strict Avalanche Criterion of SHA-256 and Sub-Function-Removed Variants

open access: yesCryptography
The measure of diffusion, the property of dissipating patterns and statistical structures in cryptographic transformations, serves as a valuable heuristic for assessing the obscurity of patterns that could lead to collisions.
Riley Vaughn, Mike Borowczak
doaj   +1 more source

Secure Message Hashing with SHA-256: Cryptographic Implementation

open access: yesInternational Journal for Research in Applied Science and Engineering Technology
Hash Functions are fundamental devices in the information security on the internet. The hash function used in various security applications are known as cryptographic hash function. The cryptographic hash function plays a crucial role in cryptography to ensure certain security objectives.
openaire   +1 more source

Securing internet of things devices using a hybrid approach. [PDF]

open access: yesSci Rep
Jenny RS   +9 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy