Sign Up to like & get
recommendations!
0
Published in 2019 at "Soft Computing"
DOI: 10.1007/s00500-019-04020-4
Abstract: Providing security becomes a more important task due to the increase in network users and cost of network resources. So, consider this issue to propose a new group hash function-based enhanced and maintain integrity and…
read more here.
Keywords:
service;
security;
network;
hash function ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2017 at "Science China Information Sciences"
DOI: 10.1007/s11432-017-9119-6
Abstract: SM3 is the Chinese hash standard and is standardized in GB/T 32905-2016 [1]. As a hash function, it must fulfill three security requirements, collision resistance, preimage resistance, and second preimage resistance. During the ongoing evaluation,…
read more here.
Keywords:
boomerang attack;
step;
preimage;
hash function ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2019 at "Journal of King Saud University - Computer and Information Sciences"
DOI: 10.1016/j.jksuci.2019.10.003
Abstract: Abstract Provably secure keyless hash function uses Random Oracle (RO) or Sponge principles for the design and construction of security-centric hash algorithms. It capitalizes the aforesaid principles to produce outcomes like MD2, MD5, SHA-160, SHA-224/256,…
read more here.
Keywords:
provably secure;
polynomial function;
sha;
hash function ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2019 at "IEEE Access"
DOI: 10.1109/access.2019.2928000
Abstract: Transport innovations and technological improvements have increased attention to specific techniques of communications, such as millimeter-wave radars used in autonomous vehicles (AVs). In order to improve the performance of antijamming capability of a millimeter-wave radar,…
read more here.
Keywords:
millimeter wave;
wave radar;
function;
hash function ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2020 at "IEEE Access"
DOI: 10.1109/access.2020.3038219
Abstract: The design of cryptographic engines for the Internet of Things (IoT) edge devices and other ultralightweight devices is a crucial challenge. The emergence of such resource-constrained devices raises significant challenges to current cryptographic algorithms. PHOTON…
read more here.
Keywords:
hash;
photon hash;
architecture;
hash function ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2021 at "IEEE Access"
DOI: 10.1109/access.2021.3049881
Abstract: Many chaos-based hash functions have convoluted designs that are not based on proper design principles, complicating the verification of security claims. We address this problem by proposing a hash function based on a chaotic sponge…
read more here.
Keywords:
dna;
hash function;
sponge;
dna sequence ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2018 at "Indonesian Journal of Electrical Engineering and Computer Science"
DOI: 10.11591/ijeecs.v11.i1.pp256-262
Abstract: Wireless Body Area Networks (WBANs) are fundamental technology in health care that permits the information of a patient’s essential body parameters to be gathered by the sensors. However, the safety and concealment defense of the…
read more here.
Keywords:
health;
information;
signature;
hash function ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2022 at "Applied optics"
DOI: 10.1364/ao.458422
Abstract: A method is proposed for constructing a cryptographic hash function based on the interaction between linearly polarized light and multiple-scattering media in a parallel fashion. It is well known that an unpredictable noise-like speckle pattern…
read more here.
Keywords:
linearly polarized;
hash function;
function based;
polarized light ... See more keywords