Results 31 to 40 of about 3,272 (163)

Implementasi Algoritma AES 256 CBC, BASE 64, Dan SHA 256 dalam Pengamanan dan Validasi Data Ujian Online

open access: yesJurnal Teknologi Informasi dan Ilmu Komputer, 2023
Terdapat berbagai macam cara untuk melaksanakan ujian di tingkat perguruan tinggi, selama masa pandemi Covid-19 metode ujian online menjadi banyak digunakan.
Ferzha Putra Utama   +3 more
doaj   +3 more sources

New Cryptanalysis of ZUC-256 Initialization Using Modular Differences

open access: yesIACR Transactions on Symmetric Cryptology, 2022
ZUC-256 is a stream cipher designed for 5G applications by the ZUC team. Together with AES-256 and SNOW-V, it is currently being under evaluation for standardized algorithms in 5G mobile telecommunications by Security Algorithms Group of Experts (SAGE).
Fukang Liu   +5 more
doaj   +1 more source

Three Fish Algorithm: T-Mix Cipher using SHA-256

open access: yesInternational Journal of Innovative Technology and Exploring Engineering, 2022
In every organization, use of online services is increasing. With this the sensitive data is carried over internet on daily basis. Hence, there is a chance of misleading the data by unauthorized parties. So, there is need to provide security for that data and cryptography is the science that helps in providing security.
S. Shajarin   +4 more
openaire   +1 more source

Secure Medical Blockchain Model

open access: yesInformation, 2023
The Internet of Medical Things (IoMT) uses wireless networks to help patients to communicate with healthcare professionals. Therefore, IoMT devices suffer from a lack of security controls, just like many Internet of Things (IoT) gadgets.
Ibrahim Shawky Farahat   +4 more
doaj   +1 more source

Analysis of the cryptographic strength of the SHA-256 hash function using the SAT approach

open access: yesНаучно-технический вестник информационных технологий, механики и оптики
Cryptographic hash functions play a significant role in modern information security systems by ensuring data integrity and enabling efficient data compression. One of the most important and widely used cryptographic hash functions is SHA-256 that belongs
V. V. Davydov   +3 more
doaj   +1 more source

Miners' Reward Elasticity and Stability of Competing Proof‐of‐Work Cryptocurrencies

open access: yesInternational Economic Review, EarlyView.
ABSTRACT Proof‐of‐Work cryptocurrencies employ miners to sustain the system through algorithmic reward adjustments. We develop a stochastic model of the multicurrency mining and identify conditions for stable transaction speeds. Bitcoin's algorithm requires hash supply elasticity <$<$1 for stability, while ASERT remains stable for any elasticity and ...
Kohei Kawaguchi   +2 more
wiley   +1 more source

A secure and efficient cryptographic hash function based on NewFORK-256

open access: yesEgyptian Informatics Journal, 2012
Cryptographic hash functions serve as a fundamental building block of information security and are used in numerous security applications and protocols such as digital signature schemes, construction of MAC and random number generation, for ensuring data
Harshvardhan Tiwari, Krishna Asawa
doaj   +1 more source

Engineered surface strategies to manage dental implant‐related infections

open access: yesPeriodontology 2000, EarlyView.
Abstract When exposed to the oral environment, dental implants, like natural surfaces, become substrates for microbial adhesion and accumulation, often leading to implant‐related infections—one of the main causes of implant failure. These failures impose significant costs on patients, clinicians, and healthcare systems.
João Gabriel S. Souza   +7 more
wiley   +1 more source

Do Just Energy Transition Partnerships collide or converge with substantive investment law standards? Case studies from Indonesia and Vietnam

open access: yesReview of European, Comparative &International Environmental Law, EarlyView.
Abstract Just Energy Transition Partnerships (JETPs) are novel financing mechanisms that encourage coal‐dependent emerging economies to transition away from fossil fuels. JETPs aim to facilitate coal phaseout and transitions to renewable energy through private and public financing.
Francine Hug
wiley   +1 more source

Fast Implementation of SHA-3 in GPU Environment

open access: yesIEEE Access, 2021
Recently, Graphic Processing Units (GPUs) have been widely used for general purpose applications such as machine learning applications, acceleration of cryptographic applications (especially, blockchains), etc.
Hojin Choi, Seog Chung Seo
doaj   +1 more source

Home - About - Disclaimer - Privacy