Secure hash algorithms and the corresponding FPGA optimization techniques
Cryptographic hash functions are widely used primitives with a purpose to ensure the
integrity of data. Hash functions are also utilized in conjunction with digital signatures to …
integrity of data. Hash functions are also utilized in conjunction with digital signatures to …
Securemed: A blockchain‐based privacy‐preserving framework for internet of medical things
The Internet of Medical Things (IoMT) connects a huge amount of smart sensors with the
Internet for healthcare service provisioning. IoMT's privacy‐preserving becomes a challenge …
Internet for healthcare service provisioning. IoMT's privacy‐preserving becomes a challenge …
A review of MongoDB and singularity container security in regards to hipaa regulations
A Mailewa Dissanayaka, RR Shetty, S Kothari… - … Proceedings of the10th …, 2017 - dl.acm.org
Nowadays Linux Containers which have operating system level virtualization, are very
popular over virtual machines (VMs) which have hypervisor or kernel level virtualization in …
popular over virtual machines (VMs) which have hypervisor or kernel level virtualization in …
Multiple-image encryption algorithm based on mixed image element and permutation
X Zhang, X Wang - Optics and Lasers in Engineering, 2017 - Elsevier
To improve encryption efficiency and facilitate the secure transmission of multiple digital
images, by defining the pure image element and mixed image element, this paper presents …
images, by defining the pure image element and mixed image element, this paper presents …
An exquisite multiple image encryption harnessing multi-scroll lu–chen and chua chaotic systems employing domino strategy
V Sangavi, P Thangavel - Journal of Information Security and Applications, 2023 - Elsevier
The enormous growth of information in the digital era has urged the researchers to secure
the digital content. Guaranteeing security to these aspects remain to be the demanding …
the digital content. Guaranteeing security to these aspects remain to be the demanding …
A new algorithm for medical color images encryption using chaotic systems
SS Moafimadani, Y Chen, C Tang - Entropy, 2019 - mdpi.com
In this paper, we present a new algorithm based on chaotic systems to protect medical
images against attacks. The proposed algorithm has two main parts: A high-speed …
images against attacks. The proposed algorithm has two main parts: A high-speed …
Covid-19: Digital signature impact on higher education motivation performance
At present, the process of validating documents for certain purposes cannot be done face-to-
face because of the Covid-19 pandemic. Therefore, this research aims to maximize the …
face because of the Covid-19 pandemic. Therefore, this research aims to maximize the …
Smart digital signature berbasis blockchain pada pendidikan tinggi menggunakan metode swot
Validasi dokumen merupakan hal yang sangat penting dalam menyangkut keaslian aset
digital pemilik. Dimana validasi dokumen saat ini masih bersifat tradisional dengan …
digital pemilik. Dimana validasi dokumen saat ini masih bersifat tradisional dengan …
Crypto-preserving investigation framework for deep learning based malware attack detection for network forensics
The exponential growth in technology observed over the past decade has introduced newer
ways to exploit network and cyber-physical system-related vulnerabilities. Cybercriminals …
ways to exploit network and cyber-physical system-related vulnerabilities. Cybercriminals …
An optimized pipelined architecture of SHA-256 hash function
M Padhi, R Chaudhari - 2017 7th International Symposium on …, 2017 - ieeexplore.ieee.org
Real time applications of digital communication systems are rapidly increasing. Due to this
there is a huge demand for high level of security. In cryptographic algorithms, SHA-256 has …
there is a huge demand for high level of security. In cryptographic algorithms, SHA-256 has …