Hash chain
View article
Redactable Blockchain – or – Rewriting History in Bitcoin and Friends Open
We put forward a new framework that makes it possible to re-write or compress the content of any number of blocks in decentralized services exploiting the blockchain technology. As we argue, there are several reasons to prefer an editable …
View article
SPHINCS: Practical Stateless Hash-Based Signatures Open
This paper introduces a high-security post-quantum stateless hash-based signature scheme that signs hundreds of messages per second on a modern 4-core 3.5GHz Intel CPU. Signatures are 41 KB, public keys are 1 KB, and private keys are 1 KB.…
View article
A New Image Encryption Algorithm Based on Chaos and Secure Hash SHA-256 Open
In order to overcome the difficulty of key management in “one time pad” encryption schemes and also resist the attack of chosen plaintext, a new image encryption algorithm based on chaos and SHA-256 is proposed in this paper. The architect…
View article
MIHash: Online Hashing with Mutual Information Open
Learning-based hashing methods are widely used for nearest neighbor retrieval, and recently, online hashing methods have demonstrated good performance-complexity trade-offs by learning hash functions from streaming data. In this paper, we …
View article
A Key Protection Scheme Based on Secret Sharing for Blockchain-Based Construction Supply Chain System Open
Traditional construction supply chains suffer from extra delays, costs and information wastages due to information intermediaries. Blockchain, a decentralized infrastructure, can provide irreversibility, undeniableness, uniqueness and anon…
View article
Cloud Data Encryption and Authentication Based on Enhanced Merkle Hash Tree Method Open
Many organizations apply cloud computing to store and effectively process data for various applications. The user uploads the data in the cloud has less security due to the unreliable verification process of data integrity. In this researc…
View article
Integrity verification for digital Holy Quran verses using cryptographic hash function and compression Open
Data Integrity is one of the primary concepts in information security. The main task of the cryptographic hash function is to assure the integrity of the transmitted data. In this work, integrity verification methods for digital verses of …
View article
Hash First, Argue Later Open
Proof systems for verifiable computation (VC) have the potential to make cloud outsourcing more trustworthy. Recent schemes enable a verifier with limited resources to delegate large computations and verify their outcome based on succinct …
View article
A Novel Improvement With an Effective Expansion to Enhance the MD5 Hash Function for Verification of a Secure E-Document Open
MD5 is a one-way cryptographic function used in various fields for maintaining data integrity. The application of a Hash function can provide much protection and privacy and subsequently reduce data usage. Most users are familiar with vali…
View article
Lightweight Cryptographic Hash Functions: Design Trends, Comparative Study, and Future Directions Open
The emergence of the Internet of Things (IoT) has enabled billions of devices that collect large amounts of data to be connected. Therefore, IoT security has fundamental requirements. One critical aspect of IoT security is data integrity. …
View article
Immutability of Distributed Hash Model on Blockchain Node Storage Open
The blockchain system uses hash functions. Hash is used in the blockchain to mark each block of data. Hash function algorithms map a string that is usually hexadecimal of any size to a sequence of fixed-size bits. This journal will discuss…
View article
S6AE: Securing 6LoWPAN Using Authenticated Encryption Scheme Open
IPv6 over Low Power Wireless Personal Area Networks (6LoWPAN) has an ample share in the Internet of Things. Sensor nodes in 6LoWPAN collect vital information from the environment and transmit to a central server through the public Internet…
View article
Secure Medical Data Transmission by Using ECC with Mutual Authentication in WSNs Open
Wireless Body Area Network (WBAN) is a part of Wireless Sensor Network (WSN) which works with medical devices and capable to transmit medical data in run time. It has changed the healthcare industry and proved itself as the best technique …
View article
Stateless hash-based digital signature standard Open
This standard specifies the stateless hash-based digital signature algorithm (SLH-DSA). Digital signatures are used to detect unauthorized modifications to data and to authenticate the identity of the signatory. In addition, the recipient …
View article
T/Key Open
Time-based one-time password (TOTP) systems in use today require storing secrets on both the client and the server. As a result, an attack on the server can expose all second factors for all users in the system. We present T/Key, a time-ba…
View article
Investigating the Avalanche Effect of Various Cryptographically Secure Hash Functions and Hash-Based Applications Open
In modern cryptography, hash functions are considered as one of the key components for secure communication. They play a vital role in a wide range of applications such as ensuring the authentication and integrity of the data, in forensic …
View article
Hash Algorithm In Verification Of Certificate Data Integrity And Security Open
The hash function is the most important cryptographic primitive function and is an integral part of the blockchain data structure. Hashes are often used in cryptographic protocols, information security applications such as Digital Signatur…
View article
A New Hash Function Based on Chaotic Maps and Deterministic Finite State Automata Open
In this paper, a new chaos-based hash function is proposed based on a recently proposed structure known as the deterministic chaotic finite state automata (DCFSA). Out of its various configurations, we select the forward and parameter perm…
View article
Performance Analysis of Cryptographic Hash Functions Suitable for Use in Blockchain Open
A blockchain, or in other words a chain of transaction blocks, is a distributed database that maintains an ordered chain of blocks that reliably connect the information contained in them. Copies of chain blocks are usually stored on multip…
View article
Comparison of Hash Function Algorithms Against Attacks: A Review Open
Hash functions are considered key components of nearly all cryptographic protocols, as well as of many security applications such as message authentication codes, data integrity, password storage, and random number generation. Many hash fu…
View article
Blockchain Gateways, Bridges and Delegated Hash-Locks Open
In the current work we discuss the notion of gateways as a means for interoperability across different blockchain systems. We discuss two key principles for the design of gateway nodes and scalable gateway protocols, namely (i) the opaque …
View article
An Overview of Blockchain Technology Open
Blockchain Technology is an emerging technology nowadays. The Blockchain was first used as a Peer-to-Peer ledger for registering Bitcoin transactions. The blockchain is a singly linked list which consists of a number of transactions. The b…
View article
A Study on the Optimization of Blockchain Hashing Algorithm Based on PRCA Open
Blockchain is widely used in encrypted currency, Internet of Things (IoT), supply chain finance, data sharing, and other fields. However, there are security problems in blockchains to varying degrees. As an important component of blockchai…
View article
New Results on NMAC/HMAC when Instantiated with Popular Hash Functions Open
Results of surgical treatment of 182 patients with pleural empyema were assessed. Patients were divided into 2 groups according to the length of time between the beginning of illness and the start of treatment at the thoracosurgical depart…
View article
Hash-based signature revisited Open
The current development toward quantum attack has shocked our confidence on classical digital signature schemes. As one of the mainstreams of post quantum cryptography primitives, hash-based signature has attracted more and more concern in…
View article
Evaluation Test and Improvement of Load Balancing Algorithms of Nginx Open
Today most people can’t live without electronic devices. And more and more new devices are coming to the market every day. Apps running on these devices often connect to one or several web-based server side applications, which in turn put …
View article
Dynamic Cryptography Integrated Secured Decentralized Applications with Blockchain Programming Open
Blocks and chains are the building blocks of the blockchain, which is a community network. Blocks and chains are two terms used to describe collections of data information. The most fundamental need for a blockchain is that these postings …
View article
An Efficient Revocation Scheme for Vehicular Ad-Hoc Networks Open
In Vehicular Ad-Hoc Networks (VANETs), the distribution of certificate revocation information is a security issue to provide safety and efficiency in the transportation system. Most of the current approaches are based on distributing a Cer…
View article
Double-block Hash-then-Sum: A Paradigm for Constructing BBB Secure PRF Open
SUM-ECBC (Yasuda, CT-RSA 2010) is the first beyond birthday bound (BBB) secure block cipher based deterministic MAC. After this work, some more BBB secure deterministic MACs have been proposed, namely PMAC_Plus (Yasuda, CRYPTO 2011), 3kf9 …
View article
Hash-chain-based authentication for IoT Open
The number of everyday interconnected devices continues to increase and constitute the Internet of Things (IoT). Things are small computers equipped with sensors and wireless communications capabilities that are driven by energy constraint…