Results 11 to 20 of about 13,790 (198)
One of the first and most used hashing algorithms in blockchains is SHA-256 so the main aim of this paper is how to increase the security level of the blockchain based on the increasing hashing algorithm security.
Salwa M. Serag Eldin +7 more
doaj +1 more source
Provably secure keyless hash function uses Random Oracle (RO) or Sponge principles for the design and construction of security-centric hash algorithms. It capitalizes the aforesaid principles to produce outcomes like MD2, MD5, SHA-160, SHA-224/256, SHA ...
P. Karthik, P. Shanthi Bala
doaj +1 more source
Construction and Analysis of SHA-256 Compression Function Based on Chaos S-Box
To further improve the security of SHA-256, a compression function construction scheme based on chaotic S-box is proposed. Through the reasonable design of the iteration mode and using the nonlinearity, confusion, and anti-difference of chaotic S-box ...
Juan Wang, Ge Liu, Yongqi Chen, Shu Wang
doaj +1 more source
The Internet of Things (IoT) as an important technology consists of a heterogeneous and huge number of devices that generates an enormous amount of data in various applications.
Arkan A. Saffer +2 more
doaj +1 more source
Implementasi Enkripsi Data MD5 dan SHA-256 pada Sistem Informasi Peminjaman Buku Tanah
Setiap lapisan masyarakat harus memperhatikan keamanan sistem informasi untuk menghindari kejahatan dunia maya. Keadaan ini menimbulkan risiko yang harus dikelola untuk melindungi aset dari kejahatan dunia maya.
Hajra Rasmita Ngemba +3 more
doaj +1 more source
Rancang Bangun Teknologi Blockchain Pada Sistem Keamanan Data Jaringan Sensor
Kehadiran internet membuka banyak peluang baru. Dari begitu banyak peluang, ada yang positif seperti pemanfaatan internet untuk komunikasi, tetapi juga ada peluang yang disalahgunakan sehingga terjadilah kejahatan siber.
Adharul Muttaqin +2 more
doaj +1 more source
Secure Sensitive Data Sharing Using RSA and ElGamal Cryptographic Algorithms with Hash Functions
With the explosion of connected devices linked to one another, the amount of transmitted data grows day by day, posing new problems in terms of information security, such as unauthorized access to users’ credentials and sensitive information.
Emmanuel A. Adeniyi +4 more
doaj +1 more source
Linear and Differential Cryptanalysis of SHA-256 [PDF]
The one-way hash function plays an important role in digital signatures and message authentication from the viewpoint of security. No effective attacking method has been discovered to the algorithm of hash function standard.
Ishikawa, Hirofumi, Wang, Xiao Dong
core +1 more source
A Chabot Supported Secured Portal for Affordable Artificial Limbs [PDF]
In the last few years, there has been much demand for artificial limbs. Artificial Limbs Manufacturing Corporation of India has announced that 42 million people require artificial limbs. There are 12 million people who are suffering from limb loss and 40,
Chythanya N. Krishna +4 more
doaj +1 more source
Attacking Reduced Round SHA-256 [PDF]
The SHA-256 hash function has started getting attention recently by the cryptanalysis community due to the various weaknesses found in its predecessors such as MD4, MD5, SHA-0 and SHA-1. We make two contributions in this work. First we describe message modification techniques and use them to obtain an algorithm to generate message pairs which collide ...
Somitra Kumar Sanadhya, Palash Sarkar
openaire +1 more source

