Results 31 to 40 of about 13,790 (198)

ARCHANGEL: Tamper-proofing Video Archives using Temporal Content Hashes on the Blockchain [PDF]

open access: yes, 2019
We present ARCHANGEL; a novel distributed ledger based system for assuring the long-term integrity of digital video archives. First, we describe a novel deep network architecture for computing compact temporal content hashes (TCHs) from audio-visual ...
Bell, Mark   +10 more
core   +2 more sources

Collisions for Step-Reduced SHA-256 [PDF]

open access: yes, 2008
In this article we find collisions for step-reduced SHA-256. We develop a differential that holds with high probability if the message satisfies certain conditions. We solve the equations that arise from the conditions. Due to the carefully chosen differential and word differences, the message expansion of SHA-256 has little effect on spreading the ...
Ivica Nikolić, Alex Biryukov
openaire   +1 more source

Detection of malware in downloaded files using various machine learning models

open access: yesEgyptian Informatics Journal, 2023
Malware has become an enormous risk in today’s world. There are different kinds of malware or malicious programs found on the internet. Research shows that malware has grown exponentially over the last decade, causing substantial financial losses to ...
Akshit Kamboj   +3 more
doaj   +1 more source

Anonymity in Bitcoin and Bitmessage [PDF]

open access: yes, 2018
This report describes two projects created by the author which are based on ideas which originate from the Bitcoin community. The first, bmd, is a re-implementation of the Bitmessage protocol in go.
Krawisz, Daniel Gregory
core   +1 more source

Hybrid Chaotic-Based PRNG for Secure Cryptography Applications

open access: yesApplied Sciences, 2023
This paper suggests a novel one-dimensional (1D) map to address the limitations of traditional chaotic 1D maps. In contrast to traditional 1D maps, the proposed map has three control parameters a, μ, and c, allowing it to exhibit chaotic behavior over a ...
Abdullah M. Alnajim   +4 more
doaj   +1 more source

Blockchain Enabled Online-Voting System [PDF]

open access: yesITM Web of Conferences, 2020
A blockchain-enabled online-voting system is being proposed in this following paper. Blockchain technologies deliver an endless variety of applications that benefit from distributed economies.
Shah Akhil   +4 more
doaj   +1 more source

Dynamic accelerator provisioning for SSH tunnels in NFV environments [PDF]

open access: yes, 2019
In this demonstration, we present dynamic allocation of accelerator resources to SSH tunnels in an NFV environment. In order to accelerate a VNF, its compute-intensive operations are offloaded to hardware cores running on an FPGA.
Colle, Didier   +3 more
core   +1 more source

T‐depth reduction method for efficient SHA‐256 quantum circuit construction

open access: yesIET Information Security, 2023
To perform a quantum brute force attack on a cryptosystem based on Grover's algorithm, it is necessary to implement a quantum circuit of the cryptographic algorithm.
Jongheon Lee   +3 more
doaj   +1 more source

Security Analysis of SHA-256 and Sisters [PDF]

open access: yes, 2004
This paper studies the security of SHA-256, SHA-384 and SHA-512 against collision attacks and provides some insight into the security properties of the basic building blocks of the structure. It is concluded that neither Chabaud and Joux’s attack, nor Dobbertin-style attacks apply.
Henri Gilbert, Helena Handschuh
openaire   +1 more source

Three Fish Algorithm: T-Mix Cipher using SHA-256

open access: yesInternational Journal of Innovative Technology and Exploring Engineering, 2022
In every organization, use of online services is increasing. With this the sensitive data is carried over internet on daily basis. Hence, there is a chance of misleading the data by unauthorized parties. So, there is need to provide security for that data and cryptography is the science that helps in providing security.
S. Shajarin   +4 more
openaire   +1 more source

Home - About - Disclaimer - Privacy