Articles with "hash based" as a keyword



An efficient hash-based authenticated key agreement scheme for multi-server architecture resilient to key compromise impersonation

Sign Up to like & get
recommendations!
Published in 2020 at "Digital Communications and Networks"

DOI: 10.1016/j.dcan.2020.05.001

Abstract: Abstract During the past decade, rapid advances in wireless communication technologies have made it possible for users to access desired services using hand-held devices. Service providers have hosted multiple servers to ensure seamless online services… read more here.

Keywords: hash based; scheme; authenticated key; multi server ... See more keywords

Resilient quantum secret sharing against collusion and eavesdropping: a measurement-basis and hash-based approach

Sign Up to like & get
recommendations!
Published in 2025 at "Physica Scripta"

DOI: 10.1088/1402-4896/ae11df

Abstract: Quantum secret sharing (QSS) is a fundamental primitive in quantum cryptography, enabling secure distribution of sensitive information among multiple parties. However, existing protocols often suffer from vulnerabilities such as collusion attacks, uneven share distribution, and… read more here.

Keywords: quantum secret; measurement basis; basis; secret sharing ... See more keywords

Hash-Based Conditional Privacy Preserving Authentication and Key Exchange Protocol Suitable for Industrial Internet of Things

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Access"

DOI: 10.1109/access.2019.2941701

Abstract: Wireless sensor networks (WSN) are integral part of Industrial Internet of Things (IIOT), the said networks comprise of elements possessing low power processors. WSNs are used for gathering data in the monitoring region, using which… read more here.

Keywords: exchange; proposed work; hash based; internet things ... See more keywords

Investigating the Avalanche Effect of Various Cryptographically Secure Hash Functions and Hash-Based Applications

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3215778

Abstract: In modern cryptography, hash functions are considered as one of the key components for secure communication. They play a vital role in a wide range of applications such as ensuring the authentication and integrity of… read more here.

Keywords: based applications; hash; hash functions; hash based ... See more keywords

Beyond Classical Cryptography: A Systematic Review of Post-Quantum Hash-Based Signature Schemes, Security, and Optimizations

Sign Up to like & get
recommendations!
Published in 2024 at "IEEE Access"

DOI: 10.1109/access.2024.3485602

Abstract: The emergence of quantum computing poses significant risks to the security of current cryptographic systems, particularly those reliant on classical algorithms vulnerable to quantum attacks. This systematic literature review adopts the PRISMA model to critically… read more here.

Keywords: signature schemes; based signature; cryptography; hash based ... See more keywords

Fast Hash-Based Inter-Block Matching for Screen Content Coding

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Transactions on Circuits and Systems for Video Technology"

DOI: 10.1109/tcsvt.2016.2643701

Abstract: In the latest High Efficiency Video Coding (HEVC) development, i.e., HEVC screen content coding extensions (HEVC-SCC), a hash-based inter-motion search/block matching scheme is adopted in the reference test model, which brings significant coding gains to… read more here.

Keywords: hash; block; hash based; scheme ... See more keywords

Hash-based and privacy-aware movie recommendations in a big data environment

Sign Up to like & get
recommendations!
Published in 2020 at "International Journal of Embedded Systems"

DOI: 10.1504/ijes.2020.10025052

Abstract: Movie recommendation is an important activity in the people's daily entertainment. Typically, through analysing the users' ever-watched movie list, a movie recommender system can recommend appropriate new movies to the target user. However, traditional movie… read more here.

Keywords: privacy aware; recommendation; hash based; movie recommendation ... See more keywords

An Analysis of Existing Hash-Based Post-Quantum Signature Schemes

Sign Up to like & get
recommendations!
Published in 2025 at "Symmetry"

DOI: 10.3390/sym17060919

Abstract: The rapid development of quantum computing poses challenges to the foundations of traditional cryptography. The threats are significant in terms of both asymmetric cryptography (which exposes schemes like RSA and ECC to efficient attacks) and… read more here.

Keywords: post quantum; signature; cryptography; hash based ... See more keywords