Results 11 to 20 of about 13,790 (198)

Design and Analysis of New Version of Cryptographic Hash Function Based on Improved Chaotic Maps With Induced DNA Sequences

open access: yesIEEE Access, 2023
One of the first and most used hashing algorithms in blockchains is SHA-256 so the main aim of this paper is how to increase the security level of the blockchain based on the increasing hashing algorithm security.
Salwa M. Serag Eldin   +7 more
doaj   +1 more source

A new design paradigm for provably secure keyless hash function with subsets and two variables polynomial function

open access: yesJournal of King Saud University: Computer and Information Sciences, 2022
Provably secure keyless hash function uses Random Oracle (RO) or Sponge principles for the design and construction of security-centric hash algorithms. It capitalizes the aforesaid principles to produce outcomes like MD2, MD5, SHA-160, SHA-224/256, SHA ...
P. Karthik, P. Shanthi Bala
doaj   +1 more source

Construction and Analysis of SHA-256 Compression Function Based on Chaos S-Box

open access: yesIEEE Access, 2021
To further improve the security of SHA-256, a compression function construction scheme based on chaotic S-box is proposed. Through the reasonable design of the iteration mode and using the nonlinearity, confusion, and anti-difference of chaotic S-box ...
Juan Wang, Ge Liu, Yongqi Chen, Shu Wang
doaj   +1 more source

LIGHTWEIGHT CRYPTOGRAPHY METHOD IN THE INTERNET OF THINGS USING ELLIPTIC CURVE AND CROW SEARCH ALGORITHM

open access: yesScience Journal of University of Zakho, 2023
The Internet of Things (IoT) as an important technology consists of a heterogeneous and huge number of devices that generates an enormous amount of data in various applications.
Arkan A. Saffer   +2 more
doaj   +1 more source

Implementasi Enkripsi Data MD5 dan SHA-256 pada Sistem Informasi Peminjaman Buku Tanah

open access: yesTechno.Com, 2023
Setiap lapisan masyarakat harus memperhatikan keamanan sistem informasi untuk menghindari kejahatan dunia maya. Keadaan ini menimbulkan risiko yang harus dikelola untuk melindungi aset dari kejahatan dunia maya.
Hajra Rasmita Ngemba   +3 more
doaj   +1 more source

Rancang Bangun Teknologi Blockchain Pada Sistem Keamanan Data Jaringan Sensor

open access: yesJurnal EECCIS (Electrics, Electronics, Communications, Controls, Informatics, Systems), 2021
Kehadiran internet membuka banyak peluang baru. Dari begitu banyak peluang, ada yang positif seperti pemanfaatan internet untuk komunikasi, tetapi juga ada peluang yang disalahgunakan sehingga terjadilah kejahatan siber.
Adharul Muttaqin   +2 more
doaj   +1 more source

Secure Sensitive Data Sharing Using RSA and ElGamal Cryptographic Algorithms with Hash Functions

open access: yesInformation, 2022
With the explosion of connected devices linked to one another, the amount of transmitted data grows day by day, posing new problems in terms of information security, such as unauthorized access to users’ credentials and sensitive information.
Emmanuel A. Adeniyi   +4 more
doaj   +1 more source

Linear and Differential Cryptanalysis of SHA-256 [PDF]

open access: yes, 2005
The one-way hash function plays an important role in digital signatures and message authentication from the viewpoint of security. No effective attacking method has been discovered to the algorithm of hash function standard.
Ishikawa, Hirofumi, Wang, Xiao Dong
core   +1 more source

A Chabot Supported Secured Portal for Affordable Artificial Limbs [PDF]

open access: yesE3S Web of Conferences, 2023
In the last few years, there has been much demand for artificial limbs. Artificial Limbs Manufacturing Corporation of India has announced that 42 million people require artificial limbs. There are 12 million people who are suffering from limb loss and 40,
Chythanya N. Krishna   +4 more
doaj   +1 more source

Attacking Reduced Round SHA-256 [PDF]

open access: yes, 2008
The SHA-256 hash function has started getting attention recently by the cryptanalysis community due to the various weaknesses found in its predecessors such as MD4, MD5, SHA-0 and SHA-1. We make two contributions in this work. First we describe message modification techniques and use them to obtain an algorithm to generate message pairs which collide ...
Somitra Kumar Sanadhya, Palash Sarkar
openaire   +1 more source

Home - About - Disclaimer - Privacy