Secure hash algorithms and the corresponding FPGA optimization techniques

ZA Al-Odat, M Ali, A Abbas, SU Khan - ACM Computing Surveys (CSUR), 2020 - dl.acm.org
Cryptographic hash functions are widely used primitives with a purpose to ensure the
integrity of data. Hash functions are also utilized in conjunction with digital signatures to …

Securemed: A blockchain‐based privacy‐preserving framework for internet of medical things

W Rafique, M Khan, S Khan… - … and Mobile Computing, 2023 - Wiley Online Library
The Internet of Medical Things (IoMT) connects a huge amount of smart sensors with the
Internet for healthcare service provisioning. IoMT's privacy‐preserving becomes a challenge …

A review of MongoDB and singularity container security in regards to hipaa regulations

A Mailewa Dissanayaka, RR Shetty, S Kothari… - … Proceedings of the10th …, 2017 - dl.acm.org
Nowadays Linux Containers which have operating system level virtualization, are very
popular over virtual machines (VMs) which have hypervisor or kernel level virtualization in …

Multiple-image encryption algorithm based on mixed image element and permutation

X Zhang, X Wang - Optics and Lasers in Engineering, 2017 - Elsevier
To improve encryption efficiency and facilitate the secure transmission of multiple digital
images, by defining the pure image element and mixed image element, this paper presents …

An exquisite multiple image encryption harnessing multi-scroll lu–chen and chua chaotic systems employing domino strategy

V Sangavi, P Thangavel - Journal of Information Security and Applications, 2023 - Elsevier
The enormous growth of information in the digital era has urged the researchers to secure
the digital content. Guaranteeing security to these aspects remain to be the demanding …

A new algorithm for medical color images encryption using chaotic systems

SS Moafimadani, Y Chen, C Tang - Entropy, 2019 - mdpi.com
In this paper, we present a new algorithm based on chaotic systems to protect medical
images against attacks. The proposed algorithm has two main parts: A high-speed …

Covid-19: Digital signature impact on higher education motivation performance

U Rahardja, S Sudaryono, NPL Santoso… - International Journal of …, 2020 - ijair.id
At present, the process of validating documents for certain purposes cannot be done face-to-
face because of the Covid-19 pandemic. Therefore, this research aims to maximize the …

Smart digital signature berbasis blockchain pada pendidikan tinggi menggunakan metode swot

M Rakhmansyah, U Rahardja, NPL Santoso… - ADI Bisnis Digital …, 2021 - adi-journal.org
Validasi dokumen merupakan hal yang sangat penting dalam menyangkut keaslian aset
digital pemilik. Dimana validasi dokumen saat ini masih bersifat tradisional dengan …

Crypto-preserving investigation framework for deep learning based malware attack detection for network forensics

S Bhardwaj, M Dave - Wireless Personal Communications, 2022 - Springer
The exponential growth in technology observed over the past decade has introduced newer
ways to exploit network and cyber-physical system-related vulnerabilities. Cybercriminals …

An optimized pipelined architecture of SHA-256 hash function

M Padhi, R Chaudhari - 2017 7th International Symposium on …, 2017 - ieeexplore.ieee.org
Real time applications of digital communication systems are rapidly increasing. Due to this
there is a huge demand for high level of security. In cryptographic algorithms, SHA-256 has …