M Almazrooie, A Samsudin, AAA Gutub… - Journal of King Saud …, 2020 - Elsevier
Data Integrity is one of the primary concepts in information security. The main task of the cryptographic hash function is to assure the integrity of the transmitted data. In this work …
Secure multi-party sum is one of the most important secure multi-party computation protocols. It has been widely applied to solve many privacy-preservation problems such as …
B Hou, F Chen - 2020 IEEE 40th international conference on …, 2020 - ieeexplore.ieee.org
Bitcoin is the world's first blockchain-based, peer-to-peer cryptocurrency system. Being tremendously successful, the Bitcoin system is designed to support reliable, secure, and …
Many online applications, especially in the financial industries, are running on blockchain technologies in a decentralized manner, without the use of an authoritative entity or a trusted …
P Jakubeit, A Dercksen, A Peter - … Security Theory and Practice: 13th IFIP …, 2020 - Springer
The self-sovereign identity (SSI) model entails the full responsibility and sovereignty of a user regarding his identity data. This identity data can contain private data which is solely …
M Sala, D Sogiorno, D Taufer - Mathematics, 2020 - mdpi.com
We show how a small subgroup confinement-like attack may be mounted on the Bitcoin addresses generation protocol, by inspecting a special subgroup of the group associated to …
Secure hash functions play a fundamental role in cryptographic and web applications. They are mainly used, in the context of digital signatures, to verify the integrity and authenticity of …
Steganography has been used as a way to hide data in files or in messages traveling on communication channels. Its use can be worrisome when it is used without proper …
A Jana, D Saha, G Paul - Proceedings of the 4th ACM Workshop on …, 2020 - dl.acm.org
In recent literature, there has been a particular interest in studying nonce-based Authenticated Encryption (AE) schemes in the light of fault-based attacks as they seem to …