Results 81 to 90 of about 13,790 (198)

Copyright Notice [PDF]

open access: yes
Using SHA2 Algorithms with Cryptographic Message Syntax This document describes the conventions for using the Secure Hash Algorithm (SHA) message digest algorithms (SHA-224, SHA-256, SHA-384, SHA-512) with the Cryptographic Message Syntax (CMS).
S. Turner
core  

Verifiable Random Functions (VRFs) [PDF]

open access: yes, 2018
A Verifiable Random Function (VRF) is the public-key version of a keyed cryptographic hash. Only the holder of the private key can compute the hash, but anyone with public key can verify the correctness of the hash.
Goldberg, Sharon   +3 more
core  

Protocol‐Agnostic Meta Key Distribution for Encrypted Wireless Communications Enabled by Space‐Time‐Coding Metasurface

open access: yesAdvanced Science, Volume 13, Issue 7, 3 February 2026.
This paper presents a programmable metasurface‐based Meta Key Distribution (MKD) system for secure, protocol‐independent key exchange in indoor wireless settings. By embedding entropy into the wireless channel, it enables lightweight, compatible cryptographic key generation.
Xinyu Li   +7 more
wiley   +1 more source

Evaluating the Energy Costs of SHA-256 and SHA-3 (KangarooTwelve) in Resource-Constrained IoT Devices

open access: yesIoT
The rapid expansion of Internet of Things (IoT) devices has heightened the demand for lightweight and secure cryptographic mechanisms suitable for resource-constrained environments.
Iain Baird   +4 more
doaj   +1 more source

Forensic Analysis of WhatsApp Messenger on Android Smartphones

open access: yes, 2014
We present the forensic analysis of the artifacts left on Android devices by \textit{WhatsApp Messenger}, the client of the WhatsApp instant messaging system.
Anglano, Cosimo
core   +1 more source

Improved homomorphic evaluation for hash function based on TFHE

open access: yesCybersecurity
Homomorphic evaluation of hash functions offers a solution to the challenge of data integrity authentication in the context of homomorphic encryption. The earliest attempt to achieve homomorphic evaluation of SHA-256 hash function was proposed by Mella ...
Benqiang Wei, Xianhui Lu
doaj   +1 more source

A novel medical steganography technique based on Adversarial Neural Cryptography and digital signature using least significant bit replacement

open access: yesInternational Journal of Cognitive Computing in Engineering
With recent advances in technology protecting sensitive healthcare data is challenging. Particularly, one of the most serious issues with medical information security is protecting of medical content, such as the privacy of patients.
Mohamed Abdel Hameed   +3 more
doaj   +1 more source

A SHA-256 Hybrid-Redundancy Hardware Architecture for Detecting and Correcting Errors. [PDF]

open access: yesSensors (Basel), 2022
Algredo-Badillo I   +5 more
europepmc   +1 more source

Shake well before use: Authentication based on Accelerometer Data [PDF]

open access: yes, 2007
Small, mobile devices without user interfaces, such as Bluetooth headsets, often need to communicate securely over wireless networks. Active attacks can only be prevented by authenticating wireless communication, which is problematic when devices do not ...
Gellersen, Hans, Mayrhofer, Rene
core   +1 more source

Home - About - Disclaimer - Privacy