过去一年中添加的文章,按日期排序

Algorithm for Key Transparency with Transparent Logs

E Mollakuqe, S Rexhepi… - Open …, 2024 - open-research-europe.ec.europa.eu
2 天前 - … Security Considerations 15 Strong cryptographic hash functions, access controls,
and … This includes the implementation of strong cryptographic hash functions, rigorous access …

SLAKA-IoD: A Secure and Lightweight Authentication and Key Agreement Protocol for Internet of Drones

Y Xiao, Y Tao - Drones, 2024 - mdpi.com
3 天前 - … based on physical unclonable function (PUF), “exclusive or” (XOR) operation
and hash function, which are simple cryptographic operations and functions that can provide …

[HTML][HTML] EMAKAS: An Efficient Three-Factor Mutual Authentication and Key-Agreement Scheme For IoT Environment

T Magara, Y Zhou - Cyber Security and Applications, 2024 - Elsevier
5 天前 - … Chooses the collision resistance cryptographic hash function H : { 0 , 1 } * → { 0 , 1
} n . Derive the unique identity I D T C as H ( N T C ) using the cryptographic hash function H . …

[PDF][PDF] THE POST-QUANTUM CRYPTOGRAPHIC ALGORITHM BASED ON OTP CIPHER AND HASH FUNCTIONS

LH Dung - Journal of Science and Technique-ISSN - researchgate.net
6 天前 - … used as pre-quantum cryptographic algorithms with high secure and … cryptographic
algorithm that is capable of resisting direct attacks on the one-way property of hash functions

Integrating Quadratic Polynomial and Symbolic Chaotic Map-based Feistel Network to Improve Image Encryption Performance

E Winarno, W Hadikurniawati, K Nugroho… - IEEE …, 2024 - ieeexplore.ieee.org
6 天前 - … In the context of image cryptography, this theory guides our approach, suggesting
that … Integrating these insights, utilizing a hash function and the Feistel network, we combine …

Blockchain‐Based Piecewise Regressive Kupyna Cryptography for Secure Cloud Services

S Shanmugam, R Natarajan, G HL… - IET Information …, 2024 - Wiley Online Library
7 天前 - … using Kupyna cryptographic hash blockchain … the cryptographic hash function to
perform secure cloud services. Here, the Davies–Meyer Kupyna hash function creates a hash

Signal-Enhanced Cross-Coupled Map Lattice andApplication in Spatiotemporal Chaotic Hash Functions

Y Li, L Dai - 2024 - researchsquare.com
8 天前 - … In summary, the advances in chaotic systems have significantly impacted cryptography
and hash functions, providing novel methods for enhancing security and efficiency. This …

Mechanism for Device Authentication and Session Key Generation in Industrial Internet of Things Networks

A Kumar, U Jain, M Hussain, MKI Rahmani… - IEEE …, 2024 - ieeexplore.ieee.org
8 天前 - … a series of 373 values using XOR and hash functions, exchanging and val- 374
idating the … - 386 itive AEGIS long with hash function and a lightweight 387 cryptographic (LWC)-…

Role of hash-based signatures in quantum cryptography

G Nagarajan, RM Gopi, R Sanjai - AIP Conference Proceedings, 2024 - pubs.aip.org
9 天前 - … application and this is achieved through cryptographic algorithms like Elliptic-Curve-…
Hash function (HBS) for securing devices in quantum era. Our research is based on Hash

[PDF][PDF] Simulating SASCA on Keccak: Security Implications for Post-Quantum Cryptographic Schemes

J Maillard, T Hiscock, M Lecomte, C Clavier - scitepress.org
9 天前 - function by developing a comprehensive study of the attacker’s recovery capacity
depending on the hash function … multiple calls to hashing functions with inputs derived from …