过去一年中添加的文章,按日期排序

[HTML][HTML] EMAKAS: An Efficient Three-Factor Mutual Authentication and Key-Agreement Scheme For IoT Environment

T Magara, Y Zhou - Cyber Security and Applications, 2024 - Elsevier
5 天前 - … Chooses the collision resistance cryptographic hash function H : { 0 , 1 } * → { 0 , 1
} n . Derive the unique identity I D T C as H ( N T C ) using the cryptographic hash function H . …

Volume-Hiding Multi-Dimensional Verifiable Dynamic Searchable Symmetric Encryption Scheme for Cloud Computing

D Li, X Zhao, H Li, K Fan - IEEE Internet of Things Journal, 2024 - ieeexplore.ieee.org
5 天前 - … We use the hash function H1 to calculate the hash value based on the keyword and
dimension value information as the storage location. The encrypted bit string is then sent to …

[PDF][PDF] A short-list of pairing-friendly curves resistant to the Special TNFS algorithm at the 192-bit security level

DF Aranha, G Fotiadis, A Guillevic - 2024 - inria.hal.science
7 天前 - … the infeasibility of differentiating the hash function from a random … hash function
h bit strings as inputs/outputs, we can hash to curves by initially constructing a function to hash

Signal-Enhanced Cross-Coupled Map Lattice andApplication in Spatiotemporal Chaotic Hash Functions

Y Li, L Dai - 2024 - researchsquare.com
8 天前 - … suitable for cryptographic applications, significantly improving security performance.
In this paper, we also design a new hash function based on the SE-CCML and analyze its …

Mechanism for Device Authentication and Session Key Generation in Industrial Internet of Things Networks

A Kumar, U Jain, M Hussain, MKI Rahmani… - IEEE …, 2024 - ieeexplore.ieee.org
8 天前 - … series of 373 values using XOR and hash functions, exchanging and val- 374 idating
hash function and a lightweight 387 cryptographic (LWC)-based authentication encryption

ChaSAM: An Architecture Based on Perceptual Hashing for Image Detection in Computer Forensics

H Dos Santos, TS Martins, JAD Barreto… - IEEE …, 2024 - ieeexplore.ieee.org
9 天前 - … requirements of any cryptographic hash function is that it … The opposite premise is
also valid: the hash function must … Unlike conventional cryptographic hash functions that rely …

Enhancing Authentication Security: Analyzing Time-Based One-Time Password Systems

AB Sofian, AFAB Peradus, F Yong… - International …, 2024 - international.arteii.or.id
20 天前 - … TOTP generates dynamic, timesensitive passwords using the current time and a
secret key processed through a cryptographic hash function, significantly improving security by …

L2AI: lightweight three-factor authentication and authorization in IOMT blockchain-based environment

L Khajehzadeh, H Barati, A Barati - arXiv preprint arXiv:2407.12187, 2024 - arxiv.org
22 天前 - … The scheme relies on one-way cryptographic hashing functions and bitwise XOR
operations. Additionally, a fuzzy mining algorithm is employed on the user side to verify the …

New Distinguishing Attacks on Round-Reduced Sparkle384 and Sparkle512 Permutations

D CHANG, D HONG, J KANG - IEICE Transactions on Fundamentals …, 2024 - jstage.jst.go.jp
27 天前 - SUMMARY The Sparkle permutation family is used as an underlying building block
of the authenticated encryption scheme Schwaemm, and the hash functioncryptography

A Systematic Exploration of Evolutionary Computation for the Design of Hardware-oriented Non-cryptographic Hash Functions

M Hassan, J Vliegen, S Picek, N Mentens - Proceedings of the Genetic …, 2024 - dl.acm.org
30 天前 - … In this analysis, we take a close look at how the height of a tree influences how
well a hash function performs in terms of avalanche metrics, as shown in Figure 6. Since the …