Investigating the avalanche effect of various cryptographically secure Hash functions and Hash-based applications

D Upadhyay, N Gaikwad, M Zaman, S Sampalli - IEEE Access, 2022 - ieeexplore.ieee.org
In modern cryptography, hash functions are considered as one of the key components for
secure communication. They play a vital role in a wide range of applications such as …

Cryptography & network security hash function applications, attacks and advances: A review

AK Sharma, SK Mittal - 2019 Third International Conference on …, 2019 - ieeexplore.ieee.org
Hash Functions have a distinct paramount significance in the sub domain of Networking like
Network Security, Computer Security and Internet Security as compare to Symmetric and …

Efficient Braille Transformation for Secure Password Hashing

H Touil, N El Akkad, K Satori, NF Soliman… - IEEE …, 2024 - ieeexplore.ieee.org
In this work, we propose a novel approach to enhancing the security of passwords before
storing them in databases. Our method utilizes Braille transformation to encrypt the …

An SHA-3 Hardware Architecture against Failures Based on Hamming Codes and Triple Modular Redundancy

A Torres-Alvarado, LA Morales-Rosales… - Sensors, 2022 - mdpi.com
Cryptography has become one of the vital disciplines for information technology such as IoT
(Internet Of Things), IIoT (Industrial Internet Of Things), I4. 0 (Industry 4.0), and automotive …

An intrusion resistant scada framework based on quantum and post-quantum scheme

S Ghosh, M Zaman, G Sakauye, S Sampalli - Applied Sciences, 2021 - mdpi.com
The rapid emergence of quantum computing threatens current Supervisory Control and Data
Acquisition (SCADA) security standards, mainly, American Gas Association (AGA)-12 …

[PDF][PDF] A Review on Application of Hash Functions and Digital signatures in the Blockchain Industry

S Dilhara - 2021 - researchgate.net
In a world witnessing paradigm shift towards decentralized applications, blockchain has
become a promising solution where it provides consensus and trust among participating …

Comparison of Novel STE-AMM and EDES-ACM Frameworks with a Standard Cryptography Mechanism

H Rohil - Computational Intelligence in Analytics and Information … - taylorfrancis.com
One of the tremendous services that the cloud environment offers is data sharing and
storage. However, one of the prime concerns encountered in the cloud is security. It also …

Encrypted and secure messages with CAN FD

A Acosta Montilla - 2021 - upcommons.upc.edu
The project intends to portray an approach to design a cryptographic secured way to
transmit messages on the well-known CAN bus communication protocol in modern cars …

[引用][C] A comprehensive study on digital-signatures with Hash-functions

AK Sharma, SK Mittal - Int. J. Comput. Sci. Eng, 2019