Anonymity on blockchain based e-cash protocols—A survey

N Andola, VK Yadav, S Venkatesan, S Verma - Computer Science Review, 2021 - Elsevier
The transactions in blockchain framework, based cryptocurrencies are publicly available,
thereby accessible to all users by design. However, the anonymity of blockchain …

Medical image watermarking for ownership & tamper detection

HS Alshanbari - Multimedia tools and applications, 2021 - Springer
Image watermarking can provide ownership identification as well as tamper protection.
Transform domain based image watermarking has been proven to be more robust than the …

Privacy-preserving tabular data publishing: a comprehensive evaluation from web to cloud

SA Abdelhameed, SM Moussa, ME Khalifa - Computers & Security, 2018 - Elsevier
The amount of data collected by various organizations about individuals is continuously
increasing. This includes diverse data sources often for data of high dimensionality. Most of …

Quantum collision attacks on reduced SHA-256 and SHA-512

A Hosoyamada, Y Sasaki - Annual International Cryptology Conference, 2021 - Springer
In this paper, we study dedicated quantum collision attacks on SHA-256 and SHA-512 for
the first time. The attacks reach 38 and 39 steps, respectively, which significantly improve the …

Privacy preserving data analytics for smart homes

A Chakravorty, T Wlodarczyk… - 2013 IEEE Security and …, 2013 - ieeexplore.ieee.org
A framework for maintaining security & preserving privacy for analysis of sensor data from
smart homes, without compromising on data utility is presented. Storing the personally …

Preimages for step-reduced SHA-2

K Aoki, J Guo, K Matusiewicz, Y Sasaki… - Advances in Cryptology …, 2009 - Springer
In this paper, we present preimage attacks on up to 43-step SHA-256 (around 67% of the
total 64 steps) and 46-step SHA-512 (around 57.5% of the total 80 steps), which significantly …

Silicon photonic physical unclonable function

BC Grubel, BT Bosworth, MR Kossey, H Sun… - Optics …, 2017 - opg.optica.org
Physical unclonable functions (PUFs) serve as a hardware source of private information that
cannot be duplicated and have applications in hardware integrity and information security …

Entropy‐Based Block Scrambling Image Encryption Using DES Structure and Chaotic Systems

X Zhang, L Wang, G Cui, Y Niu - International journal of optics, 2019 - Wiley Online Library
Traditional encryption algorithms are inefficient when applied to image encryption because
image data have the characteristics of large data sizes and strong correlations between …

Finding SHA-2 characteristics: searching through a minefield of contradictions

F Mendel, T Nad, M Schläffer - … 2011: 17th International Conference on the …, 2011 - Springer
In this paper, we analyze the collision resistance of SHA-2 and provide the first results since
the beginning of the NIST SHA-3 competition. We extend the previously best known semi …

New collision attacks against up to 24-step SHA-2

SK Sanadhya, P Sarkar - Progress in Cryptology-INDOCRYPT 2008: 9th …, 2008 - Springer
In this work, we provide new and improved attacks against 22, 23 and 24-step SHA-2 family
using a local collision given by Sanadhya and Sarkar (SS) at ACISP'08. The success …