S Banik, T Isobe, F Liu, K Minematsu… - IACR Transactions on …, 2021 - tosc.iacr.org
We present Orthros, a 128-bit block pseudorandom function. It is designed with primary focus on latency of fully unrolled circuits. For this purpose, we adopt a parallel structure …
G Cano-Quiveu, P Ruiz-de-clavijo-Vazquez, MJ Bellido… - Electronics, 2021 - mdpi.com
The Internet of Things (IoT) security is one of the most important issues developers have to face. Data tampering must be prevented in IoT devices and some or all of the confidentiality …
F Páez, H Kaschel - 2021 IEEE CHILEAN Conference on …, 2021 - ieeexplore.ieee.org
Today's most relevant in-vehicle communication buses (CAN, LIN, FlexRay) offer no standard cybersecurity features, being highly vulnerable to local and remote cyberattacks …
BP Kosta, PS Naidu - International Journal of Advanced …, 2021 - pdfs.semanticscholar.org
Cryptographic hash function assumes a fundamental job in numerous pieces of cryptographic algorithm and conventions, particularly in authentication, non-repudiation and …
M Grabatin, W Hommel - 2021 IFIP/IEEE International …, 2021 - ieeexplore.ieee.org
Verifying the identity of nodes within a wireless ad hoc mesh network and the authenticity of their messages in sufficiently secure, yet power-efficient ways is a long-standing challenge …
It is well known that conventional digital signature algorithms such as RSA and ECDSA are vulnerable to quantum computing attacks. Hash-based signature schemes are attractive as …
W Easttom, W Easttom - Modern Cryptography: Applied Mathematics for …, 2021 - Springer
Cryptographic hashes are utilized for many purposes, the most common is data integrity. The nature of a hash makes it an excellent tool for verifying message integrity. Hashes are …
Let us begin the study of cryptography with the classic problem of transmitting secret messages from a sender A to a receiver B. Both the sender and the receiver may be …
S Aggarwal, N Kumar - Advances in Computers, 2021 - Elsevier
Hashing is a method to store and retrieve records from a database. Anyone can insert, delete, and search for records based on a search key value. When hashes are implemented …