Zobrazeno 1 - 10
of 305
pro vyhledávání: '"Secure Hash Standard"'
Steganography is one of the leading strategy that is employed to hide restricted content into a cover media so that the person unaware of the fact can’t predict that the cover media can acquire some secret information. The effectiveness of any steg
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::fb4d2fba34f95b6461670dcf72e49b2d
https://doi.org/10.21203/rs.3.rs-193132/v1
https://doi.org/10.21203/rs.3.rs-193132/v1
Autor:
Amrit Singh
Publikováno v:
International Journal for Research in Applied Science and Engineering Technology. :1317-1324
Autor:
Jyoti .V. Ighare
Publikováno v:
International Journal of Engineering Research and Applications. :10-14
Publikováno v:
Cryptography and Communications. 10:383-399
In this paper, we present a message authentication scheme based on cryptographically secure cyclic redundancy check (CRC). Similarly to previously proposed cryptographically secure CRCs, the presented one detects both random and malicious errors with
Publikováno v:
IEICE ELECTRONICS EXPRESS. 14(11):1-9
Autor:
Vineet Mehan
Publikováno v:
Recent Advances in Computational Intelligence ISBN: 9783030124991
Recent Advances in Computational Intelligence
Recent Advances in Computational Intelligence
Fingerprinting is an extension to the watermarking principle where each copy of the image is embedded with unique purchaser’s information. Secure fingerprinting aims to prevent efforts to identify the embedded contents. It offers an effective traci
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::65fd01062ea5e9bcae52504d540bc590
https://doi.org/10.1007/978-3-030-12500-4_15
https://doi.org/10.1007/978-3-030-12500-4_15
Publikováno v:
Journal of Al-Nahrain University-Science. 19:148-153
In cryptography, hash functions have very important effects when it’s used in the message integrity, digital time stamping, and digital signature. Hash functions compute hash value by a set of logical (primitive) operations that perform on a (32) b
Publikováno v:
Al-Riyami, A, Zhang, N & Keane, J 2016, ' Impact of Hash Value Truncation on ID Anonymity in Wireless Sensor Networks ', Ad Hoc Networks, vol. 45, pp. 80-103 . https://doi.org/10.1016/j.adhoc.2016.02.019
Hash functions have been used to address security requirements such as integrity, message authentication and non-repudiation. In WSNs, these functions are also used to preserve sensor nodes' identity (ID) anonymity, i.e., they are used to generate an
Autor:
Mahendra Vucha, Pasupuleti Sailaja
Publikováno v:
International Journal of Computer Applications. 139:19-24
Cryptography is a technique that protects the information, which is in transit or in storage, from unauthorized or unexpected reveals. This paper demonstrates a Secure Hash Algorithm-3(SHA-3) called Keccack, and also proposeda hardware architecture f
Autor:
Nithin R. Chandran, Ebin M. Manuel
Publikováno v:
Procedia Technology. 24:904-910
Security services have become an inseparable feature of almost all digital transactions. A crucial module of these scheme isintegrity, which is performed using a cryptographic hash function. Secure Hash Algorithm can be an efficient hashing technique