Results 71 to 80 of about 3,272 (163)

Perbandingan Algoritma AES128 dengan SHA256 dalam Kecepatan Enkripsi Pengiriman Data

open access: yesJOINS (Journal of Information System)
Internet of Things bekerja untuk menyediakan berbagai layanan yang menghubungkan sensor dengan aktuator. Pada masa sekarang, layanan IoT telah banyak digunakan diberbagai bidang.
Rina Setiani   +4 more
doaj   +1 more source

Skyscraper: Fast Hashing on Big Primes

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
Arithmetic hash functions defined over prime fields have been actively developed and used in verifiable computation (VC) protocols. Among those, ellipticcurve- based SNARKs require large (256-bit and higher) primes. Such hash functions are notably slow,
Clémence Bouvier   +6 more
doaj   +1 more source

SHA-256 Collision Attack with Programmatic SAT

open access: yes
To appear in the 2024 Proceedings of the International Workshop on Satisfiability Checking and Symbolic ...
Alamgir, Nahiyan   +2 more
openaire   +2 more sources

Algebraic Fault Attack on the SHA-256 Compression Function

open access: yesInternational Journal of Research in Computer Science, 2014
The cryptographic hash function SHA-256 is one member of the SHA-2 hash family, which was proposed in 2000 and was standardized by NIST in 2002 as a successor of SHA-1. Although the differential fault attack on SHA-1compression function has been proposed, it seems hard to be directly adapted to SHA-256.
Ronglin Hao   +3 more
openaire   +1 more source

Tamper‐aware authentication framework for wireless sensor networks

open access: yesIET Wireless Sensor Systems, 2017
Sensor nodes once deployed onto the field are mostly provided with little or no attention making them prone to physical attacks by adversaries. Various security frameworks have been proposed to mitigate tampering; others also ensure authentication of ...
Henry Nunoo‐Mensah   +2 more
doaj   +1 more source

AN EFFICIENT HASH ALGORITHM TO PRESERVE DATA INTEGRITY [PDF]

open access: yesJournal of Engineering Science and Technology, 2018
Recent advancements in the field of electronic commerce and internet banking have led to the growing need for a secure communication system. Various other areas including military require a highly reliable system so as to make sure that the shared data ...
GURPREET K. SODHI, GURJOT S. GABA
doaj  

Perancangan Aplikasi Duplicate Video Scanner Menerapkan Algoritma Sha-256

open access: yesBulletin of Artificial Intelligence, 2022
In this increasingly advanced era, new technologies that have never been imagined before are increasingly emerging, starting from the emergence of computers, cellphones, and many more. One of the emerging technologies is MPEG4 (Moving Picture Expert Group)-4 Video Player 3 or better known as MP4.
openaire   +1 more source

Secure Data Management Via Lightweight Cryptographic Frameworks: A Comparative Study of ChaCha20 for Encryption and SHA-256 for Hashing Secure Using a Big Data

open access: yesProceedings of the International Conference on Applied Innovations in IT
With the advent of large-scale data applications, the security and efficiency of cryptographic systems have become two critical concerns. In this paper we present a cryptographic solution that combines the ChaCha20 encryption algorithm and SHA-256 ...
Azhar Sadiq Jafer, Huda Najeh Abbood
doaj   +1 more source

An algorithm for securing user credentials by combining Encryption and Hashing method

open access: yesInternational Journal of Electrical Engineering and Applied Sciences, 2020
Internet browsers, run on electronic devices usually preserve sensitive information, for example, client identifications. With present day innovation, most of the internet browsers uses password logins as an initial validation to demonstrate a client's ...
Awlad Hossain   +3 more
doaj  

Block chain enabled hybrid cryptographic algorithm for security and privacy preservation of electronic health records

open access: yesICT Express
With recent trends, the cloud-computing paradigm has gained significant attention, especially in patient health monitoring applications. To date, several cryptographic methods have been introduced to accomplish secure medical data access and storage in ...
J. Ananda Babu   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy