Zobrazeno 1 - 10
of 508
pro vyhledávání: '"sha-1"'
Publikováno v:
IET Information Security, Vol 17, Iss 4, Pp 647-663 (2023)
Abstract Neutral bits and boomerangs are key techniques for accelerating collision search in SHA‐1 attacks. The current acceleration techniques for SHA‐1 near‐collision attacks are reviewed and a generic search framework for neutral bits and bo
Externí odkaz:
https://doaj.org/article/228c20665d3442bd8a540effc807c8d6
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
E. V. Listopad
Publikováno v:
Doklady Belorusskogo gosudarstvennogo universiteta informatiki i radioèlektroniki, Vol 0, Iss 2, Pp 11-17 (2019)
An analysis of hardware implementations of the cryptographic hash function SHA-1 based on pipeline circuits with different numbers of logic levels was made in this paper. The hardware implementations of the hash function SHA-1 for high performance ap
Externí odkaz:
https://doaj.org/article/129ede43b5a84059bdb7d7a64337cbbc
Publikováno v:
IEEE Access, Vol 7, Pp 49945-49950 (2019)
The remote transmission of tumor ultrasound images is an important link in telemedicine. Based on the Galois field (GF), this paper proposes an encryption algorithm that ensures the security of tumor ultrasound images (TUIs) during the transmission.
Externí odkaz:
https://doaj.org/article/496e86ec09d347da90f3831029051c82
Publikováno v:
EAI Endorsed Transactions on Energy Web, Vol 8, Iss 31 (2021)
INTRODUCTION: In order to protect the owner’s visual multimedia data, various watermarking methods have introducedin the last few years. In image watermarking techniques, a secret watermark image inserted into another image.OBJECTIVES: The main aim
Externí odkaz:
https://doaj.org/article/a7b64a9a7ceb429d8753952467b32dde
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
Baghdad Science Journal, Vol 17, Iss 3(Suppl.) (2020)
The widespread use of the Internet of things (IoT) in different aspects of an individual’s life like banking, wireless intelligent devices and smartphones has led to new security and performance challenges under restricted resources. The Elliptic C
Externí odkaz:
https://doaj.org/article/25e69a198fe74e3abd939f83cf0a73c2
Autor:
Tiwari, Harshvardhan
Publikováno v:
Journal of Information and Organizational Sciences. 41(2):283-304
Externí odkaz:
https://www.ceeol.com/search/article-detail?id=592239
Autor:
Harshvardhan Tiwari
Publikováno v:
Journal of Information and Organizational Sciences, Vol 41, Iss 2, Pp 283-304 (2017)
Cryptographic hash function is an important cryptographic tool in the field of information security. Design of most widely used hash functions such as MD5 and SHA-1 is based on the iterations of compression function by Merkle-Damgård construction me
Externí odkaz:
https://doaj.org/article/e6732c3b987e42418a5c6ac13c7150c3
Autor:
Ratno Prasetyo, Asep Suryana
Publikováno v:
Jurnal Sisfokom, Vol 5, Iss 2, Pp 61-65 (2016)
Dampak positif kemajuan teknologi informasi dapat membantu menyelesaikan pekerjan dan pertukaran data dan informasi dengan cepat, akurat, dan efisien. Namun disisi lain, terdapat dampak negative berupa penyadapan yang memngakibatkan suatu data dan in
Externí odkaz:
https://doaj.org/article/eb627afe658f41998f17d63139548ba0