Search
Search Results
-
Improved homomorphic evaluation for hash function based on TFHE
Homomorphic evaluation of hash functions offers a solution to the challenge of data integrity authentication in the context of homomorphic...
-
Leakage-resilient identity-based cryptography from minimal assumptions
Identity-based hash proof system (IB-HPS), a variant of hash proof system (HPS) in the identity-based setting, is a useful building block in...
-
A CUDA-based parallel optimization method for SM3 hash algorithm
Hash algorithms are among the most crucial algorithms in cryptography. The SM3 algorithm is a hash cryptographic standard of China. Because of the...
-
Hash-based signature revisited
The current development toward quantum attack has shocked our confidence on classical digital signature schemes. As one of the mainstreams of post...
-
A gapless code-based hash proof system based on RQC and its applications
Cramer and Shoup introduced at Eurocrypt’02 the concept of hash proof system, also designated as smooth projective hash functions. Since then, they...
-
Image pixels swap** encryption based on the TetraVex game and a publicly hash-sharing algorithm
Traditionally, keys are generated using the hash value of the given image in the image cryptography to boost the security effects. The keys have been...
-
A novel secure cryptography model for data transmission based on Rotor64 technique
In recent years, there have been many Security vulnerabilities that threaten user security, these threats have led to the finding of user files, so...
-
Secure authentication framework for IoT applications using a hash-based post-quantum signature scheme
In today’s era, numerous applications are evolving into smart applications by leveraging technologies like the Internet of Things (IoT), Artificial...
-
Auto-authentication watermarking scheme based on CNN and perceptual hash function in the wavelet domain
This paper presents a novel method for image watermarking authentication using Convolutional Neural Networks (CNN). The proposed method addresses the...
-
Hash Functions
Hash functions are an important primitive in cryptography and are widely used in practice. They compute a digest of a message, which is a short,... -
Lattice-Based Timed Cryptography
Timed cryptography studies primitives that retain their security only for a predetermined amount of time, such as proofs of sequential work and... -
Chaos-based audio encryption algorithm using biometric image and SHA-256 hash algorithm
Today, Internet users who share personal and professional data are concerned about the safety of the data. Encryption is one way to safeguard...
-
Patent Landscape in the field of Hash-Based Post-Quantum Signatures
Post-Quantum Cryptography (PQC) is one of the most fascinating topics of recent developments in cryptography. Following the ongoing standardization... -
Security enhancement using blockchain based modified infinite chaotic elliptic cryptography in cloud
Cloud computing (CC) is an emerging field in the IT sector due to its prospective, progress and incredible impact on the development of that sector....
-
Securing cloud access with enhanced attribute-based cryptography
With technological advancements and increasing globalization, cloud computing has emerged as one of the most favoured environments for managing and...
-
Basic Cryptography: Hash Function
The algorithms in this chapter are very different from those in the previous chapter (symmetric key encryption). A Hash Function is a one-way process... -
Probabilistic root finding in code-based cryptography
Probabilistic algorithms for finding roots of polynomials have not been applied to code-based cryptography before. One obstacle is their non-constant...
-
Secure and efficient public auditing system of user data using hybrid AES-ECC crypto system with Merkle hash tree in blockchain
Data auditing permits data owners to confirm the reliability of their personal information without obtaining it from an unsafe cloud. Advertising...
-
Lattice-Based Programmable Hash Functions and Applications
Driven by the open problem raised by Hofheinz and Kiltz (J Cryptol 25(3):484–527, 2012), we study the formalization of lattice-based programmable...
-
Chaos-based Cryptography
In today’s digital world, security is paramount to protecting your data and digital life. As technology advances, so does the need for more secure...