3 天前 - … based on physical unclonable function (PUF), “exclusive or” (XOR) operation and hashfunction, which are simple cryptographic operations and functions that can provide …
T Magara, Y Zhou - Cyber Security and Applications, 2024 - Elsevier
5 天前 - … Chooses the collision resistance cryptographichashfunction H : { 0 , 1 } * → { 0 , 1 } n . Derive the unique identity I D T C as H ( N T C ) using the cryptographichashfunction H . …
LH Dung - Journal of Science and Technique-ISSN - researchgate.net
6 天前 - … used as pre-quantum cryptographic algorithms with high secure and … cryptographic algorithm that is capable of resisting direct attacks on the one-way property of hashfunctions …
6 天前 - … In the context of image cryptography, this theory guides our approach, suggesting that … Integrating these insights, utilizing a hashfunction and the Feistel network, we combine …
S Shanmugam, R Natarajan, G HL… - IET Information …, 2024 - Wiley Online Library
7 天前 - … using Kupyna cryptographichash blockchain … the cryptographichashfunction to perform secure cloud services. Here, the Davies–Meyer Kupyna hashfunction creates a hash …
8 天前 - … In summary, the advances in chaotic systems have significantly impacted cryptography and hashfunctions, providing novel methods for enhancing security and efficiency. This …
8 天前 - … a series of 373 values using XOR and hashfunctions, exchanging and val- 374 idating the … - 386 itive AEGIS long with hashfunction and a lightweight 387 cryptographic (LWC)-…
G Nagarajan, RM Gopi, R Sanjai - AIP Conference Proceedings, 2024 - pubs.aip.org
9 天前 - … application and this is achieved through cryptographic algorithms like Elliptic-Curve-… Hashfunction (HBS) for securing devices in quantum era. Our research is based on Hash …
J Maillard, T Hiscock, M Lecomte, C Clavier - scitepress.org
9 天前 - … function by developing a comprehensive study of the attacker’s recovery capacity depending on the hashfunction … multiple calls to hashingfunctions with inputs derived from …