We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 10,000 results
  1. Improved homomorphic evaluation for hash function based on TFHE

    Homomorphic evaluation of hash functions offers a solution to the challenge of data integrity authentication in the context of homomorphic...

    Benqiang Wei, **anhui Lu in Cybersecurity
    Article Open access 02 July 2024
  2. Leakage-resilient identity-based cryptography from minimal assumptions

    Identity-based hash proof system (IB-HPS), a variant of hash proof system (HPS) in the identity-based setting, is a useful building block in...

    Yanwei Zhou, Bo Yang, ... Yi Mu in Designs, Codes and Cryptography
    Article 16 August 2023
  3. A CUDA-based parallel optimization method for SM3 hash algorithm

    Hash algorithms are among the most crucial algorithms in cryptography. The SM3 algorithm is a hash cryptographic standard of China. Because of the...

    Jichang Han, Tao Peng, Xuesong Zhang in The Journal of Supercomputing
    Article 10 June 2024
  4. Hash-based signature revisited

    The current development toward quantum attack has shocked our confidence on classical digital signature schemes. As one of the mainstreams of post...

    Lingyun Li, **anhui Lu, Kunpeng Wang in Cybersecurity
    Article Open access 01 July 2022
  5. A gapless code-based hash proof system based on RQC and its applications

    Cramer and Shoup introduced at Eurocrypt’02 the concept of hash proof system, also designated as smooth projective hash functions. Since then, they...

    Slim Bettaieb, Loïc Bidoux, ... Philippe Gaborit in Designs, Codes and Cryptography
    Article 12 August 2022
  6. Image pixels swap** encryption based on the TetraVex game and a publicly hash-sharing algorithm

    Traditionally, keys are generated using the hash value of the given image in the image cryptography to boost the security effects. The keys have been...

    Muhammad Hussain, Nadeem Iqbal, Zia Bashir in Cluster Computing
    Article 19 January 2024
  7. A novel secure cryptography model for data transmission based on Rotor64 technique

    In recent years, there have been many Security vulnerabilities that threaten user security, these threats have led to the finding of user files, so...

    Ibrahim Obeidat, Ala Mughaid, ... Laith Abualigah in Multimedia Tools and Applications
    Article 30 September 2023
  8. Secure authentication framework for IoT applications using a hash-based post-quantum signature scheme

    In today’s era, numerous applications are evolving into smart applications by leveraging technologies like the Internet of Things (IoT), Artificial...

    Purvi Tandel, Jitendra Nasriwala in Service Oriented Computing and Applications
    Article 14 June 2024
  9. Auto-authentication watermarking scheme based on CNN and perceptual hash function in the wavelet domain

    This paper presents a novel method for image watermarking authentication using Convolutional Neural Networks (CNN). The proposed method addresses the...

    Hanen Rhayma, Ridha Ejbali, Habib Hamam in Multimedia Tools and Applications
    Article 03 January 2024
  10. Hash Functions

    Hash functions are an important primitive in cryptography and are widely used in practice. They compute a digest of a message, which is a short,...
    Christof Paar, Jan Pelzl, Tim Güneysu in Understanding Cryptography
    Chapter 2024
  11. Lattice-Based Timed Cryptography

    Timed cryptography studies primitives that retain their security only for a predetermined amount of time, such as proofs of sequential work and...
    Russell W. F. Lai, Giulio Malavolta in Advances in Cryptology – CRYPTO 2023
    Conference paper 2023
  12. Chaos-based audio encryption algorithm using biometric image and SHA-256 hash algorithm

    Today, Internet users who share personal and professional data are concerned about the safety of the data. Encryption is one way to safeguard...

    B. Rahul, K. Kuppusamy, A. Senthilrajan in Multimedia Tools and Applications
    Article 22 April 2023
  13. Patent Landscape in the field of Hash-Based Post-Quantum Signatures

    Post-Quantum Cryptography (PQC) is one of the most fascinating topics of recent developments in cryptography. Following the ongoing standardization...
    Megha Agrawal, Kumar Duraisamy, ... Vishal Saraswat in Progress in Cryptology – INDOCRYPT 2023
    Conference paper 2024
  14. Security enhancement using blockchain based modified infinite chaotic elliptic cryptography in cloud

    Cloud computing (CC) is an emerging field in the IT sector due to its prospective, progress and incredible impact on the development of that sector....

    Pranav Shrivastava, Bashir Alam, Mansaf Alam in Cluster Computing
    Article 14 October 2022
  15. Securing cloud access with enhanced attribute-based cryptography

    With technological advancements and increasing globalization, cloud computing has emerged as one of the most favoured environments for managing and...

    Ashutosh Kumar, Garima Verma in Computing
    Article 26 August 2023
  16. Basic Cryptography: Hash Function

    The algorithms in this chapter are very different from those in the previous chapter (symmetric key encryption). A Hash Function is a one-way process...
    Chapter 2022
  17. Probabilistic root finding in code-based cryptography

    Probabilistic algorithms for finding roots of polynomials have not been applied to code-based cryptography before. One obstacle is their non-constant...

    Dúnia Marchiori, Ricardo Custódio, ... Lucia Moura in Journal of Cryptographic Engineering
    Article 31 July 2023
  18. Secure and efficient public auditing system of user data using hybrid AES-ECC crypto system with Merkle hash tree in blockchain

    Data auditing permits data owners to confirm the reliability of their personal information without obtaining it from an unsafe cloud. Advertising...

    Shruthi Gangadharaiah, Purohit Shrinivasacharya in Multimedia Tools and Applications
    Article 09 February 2024
  19. Lattice-Based Programmable Hash Functions and Applications

    Driven by the open problem raised by Hofheinz and Kiltz (J Cryptol 25(3):484–527, 2012), we study the formalization of lattice-based programmable...

    Jiang Zhang, Yu Chen, Zhenfeng Zhang in Journal of Cryptology
    Article 29 November 2023
  20. Chaos-based Cryptography

    In today’s digital world, security is paramount to protecting your data and digital life. As technology advances, so does the need for more secure...
    Marius Iulian Mihailescu, Stefania Loredana Nita in Pro Cryptography and Cryptanalysis with C++23
    Chapter 2023
Did you find what you were looking for? Share feedback.