In sensitive communications, the cryptographic hash function plays a crucial role, including in the military, healthcare, and banking, ensuring secure transmission by verifying data …
SD Achar, TP, S Nandi, S Nandi - ACM Transactions on Embedded …, 2024 - dl.acm.org
The global paradigm shift towards edge computing has led to a growing demand for efficient integrity verification. Hash functions are one-way algorithms which act as a zero-knowledge …
Developing compact and energy-efficient Scrypt hardware for power-constrained devices is necessary to balance the distribution of blockchain networks. However, existing Scrypt …
G Uganya, RM Bommi… - Journal of Intelligent …, 2023 - content.iospress.com
Internet of things (IoT) is a recent developing technology in the field of smart healthcare. But it is difficult to transfer the patient's health record as a centralized network. So,“blockchain …
Y Luo, J Liu, C Gong, T Li - The Journal of Supercomputing, 2025 - Springer
Password-based recovery is a widely used method for regaining access to applications or services when passwords are lost or forgotten. It is commonly used in electronic forensics by …
Learning effective visual representations without human supervision is a long-standing problem in computer vision. Recent advances in self-supervised learning algorithms have …
Nowadays, cryptographic computation across various security applications necessitates the development of hardware that is not only fast and power-efficient but also flexible enough to …
VTD Le, HL Pham, TS Duong, TH Tran… - … on Knowledge and …, 2023 - ieeexplore.ieee.org
In decentralized IoT platforms, high flexibility, per-formance, and hardware efficiency are the requirements for cryptographic hardware for maintaining data security. This paper proposes …
Ensuring security in modern domains such as blockchain and IoT requires developing hashing hardware that is low-power, high-performance, and flexible with massive message …