Results 31 to 40 of about 13,790 (198)
ARCHANGEL: Tamper-proofing Video Archives using Temporal Content Hashes on the Blockchain [PDF]
We present ARCHANGEL; a novel distributed ledger based system for assuring the long-term integrity of digital video archives. First, we describe a novel deep network architecture for computing compact temporal content hashes (TCHs) from audio-visual ...
Bell, Mark +10 more
core +2 more sources
Collisions for Step-Reduced SHA-256 [PDF]
In this article we find collisions for step-reduced SHA-256. We develop a differential that holds with high probability if the message satisfies certain conditions. We solve the equations that arise from the conditions. Due to the carefully chosen differential and word differences, the message expansion of SHA-256 has little effect on spreading the ...
Ivica Nikolić, Alex Biryukov
openaire +1 more source
Detection of malware in downloaded files using various machine learning models
Malware has become an enormous risk in today’s world. There are different kinds of malware or malicious programs found on the internet. Research shows that malware has grown exponentially over the last decade, causing substantial financial losses to ...
Akshit Kamboj +3 more
doaj +1 more source
Anonymity in Bitcoin and Bitmessage [PDF]
This report describes two projects created by the author which are based on ideas which originate from the Bitcoin community. The first, bmd, is a re-implementation of the Bitmessage protocol in go.
Krawisz, Daniel Gregory
core +1 more source
Hybrid Chaotic-Based PRNG for Secure Cryptography Applications
This paper suggests a novel one-dimensional (1D) map to address the limitations of traditional chaotic 1D maps. In contrast to traditional 1D maps, the proposed map has three control parameters a, μ, and c, allowing it to exhibit chaotic behavior over a ...
Abdullah M. Alnajim +4 more
doaj +1 more source
Blockchain Enabled Online-Voting System [PDF]
A blockchain-enabled online-voting system is being proposed in this following paper. Blockchain technologies deliver an endless variety of applications that benefit from distributed economies.
Shah Akhil +4 more
doaj +1 more source
Dynamic accelerator provisioning for SSH tunnels in NFV environments [PDF]
In this demonstration, we present dynamic allocation of accelerator resources to SSH tunnels in an NFV environment. In order to accelerate a VNF, its compute-intensive operations are offloaded to hardware cores running on an FPGA.
Colle, Didier +3 more
core +1 more source
T‐depth reduction method for efficient SHA‐256 quantum circuit construction
To perform a quantum brute force attack on a cryptosystem based on Grover's algorithm, it is necessary to implement a quantum circuit of the cryptographic algorithm.
Jongheon Lee +3 more
doaj +1 more source
Security Analysis of SHA-256 and Sisters [PDF]
This paper studies the security of SHA-256, SHA-384 and SHA-512 against collision attacks and provides some insight into the security properties of the basic building blocks of the structure. It is concluded that neither Chabaud and Joux’s attack, nor Dobbertin-style attacks apply.
Henri Gilbert, Helena Handschuh
openaire +1 more source
Three Fish Algorithm: T-Mix Cipher using SHA-256
In every organization, use of online services is increasing. With this the sensitive data is carried over internet on daily basis. Hence, there is a chance of misleading the data by unauthorized parties. So, there is need to provide security for that data and cryptography is the science that helps in providing security.
S. Shajarin +4 more
openaire +1 more source

