Results 11 to 20 of about 3,272 (163)
Double SHA-256 Hardware Architecture With Compact Message Expander for Bitcoin Mining
In the Bitcoin network, computing double SHA-256 values consumes most of the network energy. Therefore, reducing the power consumption and increasing the processing rate for the double SHA256 algorithm is currently an important research trend.
Hoai Luan Pham +5 more
doaj +1 more source
The Internet of Things (IoT) as an important technology consists of a heterogeneous and huge number of devices that generates an enormous amount of data in various applications.
Arkan A. Saffer +2 more
doaj +1 more source
Rancang Bangun Teknologi Blockchain Pada Sistem Keamanan Data Jaringan Sensor
Kehadiran internet membuka banyak peluang baru. Dari begitu banyak peluang, ada yang positif seperti pemanfaatan internet untuk komunikasi, tetapi juga ada peluang yang disalahgunakan sehingga terjadilah kejahatan siber.
Adharul Muttaqin +2 more
doaj +1 more source
Implementasi Enkripsi Data MD5 dan SHA-256 pada Sistem Informasi Peminjaman Buku Tanah
Setiap lapisan masyarakat harus memperhatikan keamanan sistem informasi untuk menghindari kejahatan dunia maya. Keadaan ini menimbulkan risiko yang harus dikelola untuk melindungi aset dari kejahatan dunia maya.
Hajra Rasmita Ngemba +3 more
doaj +1 more source
Secure Sensitive Data Sharing Using RSA and ElGamal Cryptographic Algorithms with Hash Functions
With the explosion of connected devices linked to one another, the amount of transmitted data grows day by day, posing new problems in terms of information security, such as unauthorized access to users’ credentials and sensitive information.
Emmanuel A. Adeniyi +4 more
doaj +1 more source
A Chabot Supported Secured Portal for Affordable Artificial Limbs [PDF]
In the last few years, there has been much demand for artificial limbs. Artificial Limbs Manufacturing Corporation of India has announced that 42 million people require artificial limbs. There are 12 million people who are suffering from limb loss and 40,
Chythanya N. Krishna +4 more
doaj +1 more source
Attacking Reduced Round SHA-256 [PDF]
The SHA-256 hash function has started getting attention recently by the cryptanalysis community due to the various weaknesses found in its predecessors such as MD4, MD5, SHA-0 and SHA-1. We make two contributions in this work. First we describe message modification techniques and use them to obtain an algorithm to generate message pairs which collide ...
Somitra Kumar Sanadhya, Palash Sarkar
openaire +1 more source
Keamanan RESTful Web Service Menggunakan JSON Web Token (JWT) HMAC SHA-512
Day to day information technology is constantly evolving, allowing a wide range of technologies, programming languages, and diverse architectures to keep popping up.
Alam Rahmatulloh +2 more
doaj +1 more source
Carry-based Differential Power Analysis (CDPA) and its Application to Attacking HMAC-SHA-2
In this paper, we introduce Carry-based Differential Power Analysis (CDPA), a novel methodology that allows for attacking schemes that use arithmetical addition. We apply this methodology to attacking HMAC-SHA-2. We provide full mathematical analysis of
Yaacov Belenky +6 more
doaj +1 more source
Analysis of Step-Reduced SHA-256 [PDF]
This is the first article analyzing the security of SHA-256 against fast collision search which considers the recent attacks by Wang et al. We show the limits of applying techniques known so far to SHA-256. Next we introduce a new type of perturbation vector which circumvents the identified limits.
Florian Mendel +3 more
openaire +1 more source

