Zobrazeno 1 - 10
of 24 530
pro vyhledávání: '"Hash function"'
Publikováno v:
Scientific Reports, Vol 14, Iss 1, Pp 1-10 (2024)
Abstract The post-processing of quantum key distribution mainly includes error correction and privacy amplification. The error correction algorithms and privacy amplification methods used in the existing quantum key distribution are completely unrela
Externí odkaz:
https://doaj.org/article/8e1d1a9fa56f48a59d43cfe71249c1fc
Publikováno v:
Open Engineering, Vol 14, Iss 1, Pp 365-77 (2024)
There is a demand for a digital currency that facilitates remote trading over the Internet and strives to reduce external control, ensuring that transactions are conducted only between authorized persons or parties involved in the transfer. The finan
Externí odkaz:
https://doaj.org/article/c919353ce56046429585482d0856764c
Publikováno v:
Complex System Modeling and Simulation, Vol 4, Iss 3, Pp 303-319 (2024)
The design of a chaotic image encryption algorithm plays an essential role in enhancing information and communication security. The performance of such algorithms is intricately linked to the complexity of the chaotic sequence and the underlying encr
Externí odkaz:
https://doaj.org/article/245acb1c60ba4cd4846d12233a12ac73
Autor:
Benqiang Wei, Xianhui Lu
Publikováno v:
Cybersecurity, Vol 7, Iss 1, Pp 1-14 (2024)
Abstract Homomorphic evaluation of hash functions offers a solution to the challenge of data integrity authentication in the context of homomorphic encryption. The earliest attempt to achieve homomorphic evaluation of SHA-256 hash function was propos
Externí odkaz:
https://doaj.org/article/7a207e096fc74ea7a9bc8b0cc91ac68e
Autor:
Lorenzo Grassi, Dmitry Khovratovich, Reinhard Lüftenegger, Christian Rechberger, Markus Schofnegger, Roman Walch
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2024, Iss 3 (2024)
Hash functions are a crucial component in incrementally verifiable computation (IVC) protocols and applications. Among those, recursive SNARKs and folding schemes require hash functions to be both fast in native CPU computations and compact in algebr
Externí odkaz:
https://doaj.org/article/8a0edbe6b0d944389a545785d4da71f3
Publikováno v:
Egyptian Informatics Journal, Vol 27, Iss , Pp 100487- (2024)
Recently, there has been a growing demand for image encryption techniques that offer robust protection and minimize processing time. The proposed paper proposes an efficient color image encryption system that excels in speed and security. The encrypt
Externí odkaz:
https://doaj.org/article/340a1e45ebef4c65b39c246af49f5697
Autor:
Jarosław Sugier
Publikováno v:
International Journal of Electronics and Telecommunications, Vol vol. 70, Iss No 1, Pp 23-30 (2024)
This article analyzes the dynamic power losses generated by various hardware implementations of the BLAKE3 hash function. Estimations of the parameters were based on the results of post-route simulations of designs implemented in Xilinx Spartan-7 FPG
Externí odkaz:
https://doaj.org/article/578219ce740149559b4976e95b6d2d91
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2024, Iss 2 (2024)
Ultra-fast AES round-based software cryptographic authentication/encryption primitives have recently seen important developments, fuelled by the authenticated encryption competition CAESAR and the prospect of future high-profile applications such as
Externí odkaz:
https://doaj.org/article/c87b32ccd30a4206882b3d23f3b9c895
Publikováno v:
IEEE Access, Vol 12, Pp 169928-169944 (2024)
Blockchain hardware wallets, through their security-by-design architecture, offer higher security assurances. They fundamentally differ from software wallets due to an important security property called Unicity. Unicity ensures that ownership is tied
Externí odkaz:
https://doaj.org/article/d72ecdb2867646f8ab99fe3897589dda
Autor:
Mehdi Hosseinzadeh, Mohammad Reza Servati, Amir Masoud Rahmani, Masoumeh Safkhani, Jan Lansky, Renata Janoscova, Omed Hassan Ahmed, Jawad Tanveer, Sang-Woong Lee
Publikováno v:
IEEE Access, Vol 12, Pp 61610-61628 (2024)
RFID technology offers an affordable and user-friendly solution for contactless identification of objects and individuals. However, the widespread adoption of RFID systems raises concerns regarding security and privacy. Vulnerabilities such as messag
Externí odkaz:
https://doaj.org/article/c7dc8de4a53f40f3b56b78c868b8d318