Articles with "cryptographic hash" as a keyword



Lightweight Cryptographic Hash Functions: Design Trends, Comparative Study, and Future Directions

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3195572

Abstract: The emergence of the Internet of Things (IoT) has enabled billions of devices that collect large amounts of data to be connected. Therefore, IoT security has fundamental requirements. One critical aspect of IoT security is… read more here.

Keywords: design trends; hash; cryptographic hash; hash functions ... See more keywords

An adaptive image steganography algorithm based on the use of non-cryptographic hash functions for data extraction

Sign Up to like & get
recommendations!
Published in 2023 at "Computer Optics"

DOI: 10.18287/2412-6179-co-1215

Abstract: An adaptive steganography algorithm for data hiding in full-color images based on iterative introduction of minor distortions into blocks of container images and the use of high-speed non-cryptographic hash functions for data extraction is considered.… read more here.

Keywords: functions data; steganography; steganography algorithm; cryptographic hash ... See more keywords