Results 71 to 80 of about 3,272 (163)
Perbandingan Algoritma AES128 dengan SHA256 dalam Kecepatan Enkripsi Pengiriman Data
Internet of Things bekerja untuk menyediakan berbagai layanan yang menghubungkan sensor dengan aktuator. Pada masa sekarang, layanan IoT telah banyak digunakan diberbagai bidang.
Rina Setiani +4 more
doaj +1 more source
Skyscraper: Fast Hashing on Big Primes
Arithmetic hash functions defined over prime fields have been actively developed and used in verifiable computation (VC) protocols. Among those, ellipticcurve- based SNARKs require large (256-bit and higher) primes. Such hash functions are notably slow,
Clémence Bouvier +6 more
doaj +1 more source
SHA-256 Collision Attack with Programmatic SAT
To appear in the 2024 Proceedings of the International Workshop on Satisfiability Checking and Symbolic ...
Alamgir, Nahiyan +2 more
openaire +2 more sources
Algebraic Fault Attack on the SHA-256 Compression Function
The cryptographic hash function SHA-256 is one member of the SHA-2 hash family, which was proposed in 2000 and was standardized by NIST in 2002 as a successor of SHA-1. Although the differential fault attack on SHA-1compression function has been proposed, it seems hard to be directly adapted to SHA-256.
Ronglin Hao +3 more
openaire +1 more source
Tamper‐aware authentication framework for wireless sensor networks
Sensor nodes once deployed onto the field are mostly provided with little or no attention making them prone to physical attacks by adversaries. Various security frameworks have been proposed to mitigate tampering; others also ensure authentication of ...
Henry Nunoo‐Mensah +2 more
doaj +1 more source
AN EFFICIENT HASH ALGORITHM TO PRESERVE DATA INTEGRITY [PDF]
Recent advancements in the field of electronic commerce and internet banking have led to the growing need for a secure communication system. Various other areas including military require a highly reliable system so as to make sure that the shared data ...
GURPREET K. SODHI, GURJOT S. GABA
doaj
Perancangan Aplikasi Duplicate Video Scanner Menerapkan Algoritma Sha-256
In this increasingly advanced era, new technologies that have never been imagined before are increasingly emerging, starting from the emergence of computers, cellphones, and many more. One of the emerging technologies is MPEG4 (Moving Picture Expert Group)-4 Video Player 3 or better known as MP4.
openaire +1 more source
With the advent of large-scale data applications, the security and efficiency of cryptographic systems have become two critical concerns. In this paper we present a cryptographic solution that combines the ChaCha20 encryption algorithm and SHA-256 ...
Azhar Sadiq Jafer, Huda Najeh Abbood
doaj +1 more source
An algorithm for securing user credentials by combining Encryption and Hashing method
Internet browsers, run on electronic devices usually preserve sensitive information, for example, client identifications. With present day innovation, most of the internet browsers uses password logins as an initial validation to demonstrate a client's ...
Awlad Hossain +3 more
doaj
With recent trends, the cloud-computing paradigm has gained significant attention, especially in patient health monitoring applications. To date, several cryptographic methods have been introduced to accomplish secure medical data access and storage in ...
J. Ananda Babu +5 more
doaj +1 more source

