Fast hashing and rotation-symmetric functions

J Pieprzyk, C Qu - 2024 - openrepository.mephi.ru
Efficient hashing is a centerpiece of modern Cryptography. The progress in computing
technology enables us to use 64-bit machines with the promise of 128-bit machines in the …

A 2D cryptographic hash function incorporating homomorphic encryption for secure digital signatures

A Wali, H Ravichandran, S Das - Advanced Materials, 2024 - Wiley Online Library
User authentication is a critical aspect of any information exchange system which verifies the
identities of individuals seeking access to sensitive information. Conventionally, this …

Construction of nonlinear component based on bent Boolean functions

S Arshad, M Khan - Computational and Applied Mathematics, 2024 - Springer
The substitution box (S-box) is the core component of any block cipher that creates
confusion in the ciphertext. This research contributes to creating a substitution box based on …

On Efficient and Secure Compression Functions for Arithmetization-Oriented Hashing

E Andreeva, R Bhattacharyya, A Roy… - 2024 IEEE 37th …, 2024 - computer.org
ZK-SNARKs, a fundamental component of privacyoriented payment systems, identity
protocols, or anonymous voting systems, are advanced cryptographic protocols for verifiable …

Improving Supply Chain Management Processes Using Smart Contracts in the Ethereum Network Written in Solidity

E Yigit, T Dag - Applied Sciences, 2024 - mdpi.com
This paper investigates the potential of integrating supply chain management with
blockchain technology, specifically by implementing smart contracts on the Ethereum …

On Efficient and Secure Compression Modes for Arithmetization-Oriented Hashing

E Andreeva, R Bhattacharyya, A Roy… - Cryptology ePrint …, 2024 - eprint.iacr.org
ZK-SNARKs are advanced cryptographic protocols used in private verifiable computation:
modern SNARKs allow to encode the invariants of an arithmetic circuit over some large …

Error Correction Capabilities of Non-Linear Cryptographic Hash Functions

A Cohen, RGL D'Oliveira - arXiv preprint arXiv:2405.01495, 2024 - arxiv.org
Linear hashes are known to possess error-correcting capabilities. However, in most
applications, non-linear hashes with pseudorandom outputs are utilized instead. It has also …

Towards the Development of a Digital Forensic Readiness Model for 5G NFV Environments

S Makura, H Venter - 2024 IST-Africa Conference (IST-Africa), 2024 - ieeexplore.ieee.org
5G has revolutionized wireless cellular networks by providing faster speeds, higher capacity,
and lower latency. Key 5G technologies include Network Functional Virtualization (NFV) and …

A secure authentication protocol for remote patient monitoring in an internet‐of‐medical‐things environment

S Mookherji, O Vanga, R Prasath, AK Das - Security and Privacy - Wiley Online Library
Abstract Internet of Medical Things (IoMT) enable users to avail healthcare services
remotely. In IoMT, sensor nodes (SNs), like blood pressure sensors and temperature …

[PDF][PDF] Secure authentication scheme to thwart known authentication attacks using Mobile Device

MA Abbas - Mustansiriyah Journal of Pure and Applied Sciences, 2024 - iasj.net
Recently, the use of two-factors authentication (2FA) has increased to mitigate the risk of
stealing user credentials. Most of 2FA use a mobile device to complete the authentication …