Anonymity on blockchain based e-cash protocols—A survey
The transactions in blockchain framework, based cryptocurrencies are publicly available,
thereby accessible to all users by design. However, the anonymity of blockchain …
thereby accessible to all users by design. However, the anonymity of blockchain …
Medical image watermarking for ownership & tamper detection
HS Alshanbari - Multimedia tools and applications, 2021 - Springer
Image watermarking can provide ownership identification as well as tamper protection.
Transform domain based image watermarking has been proven to be more robust than the …
Transform domain based image watermarking has been proven to be more robust than the …
Privacy-preserving tabular data publishing: a comprehensive evaluation from web to cloud
The amount of data collected by various organizations about individuals is continuously
increasing. This includes diverse data sources often for data of high dimensionality. Most of …
increasing. This includes diverse data sources often for data of high dimensionality. Most of …
Quantum collision attacks on reduced SHA-256 and SHA-512
A Hosoyamada, Y Sasaki - Annual International Cryptology Conference, 2021 - Springer
In this paper, we study dedicated quantum collision attacks on SHA-256 and SHA-512 for
the first time. The attacks reach 38 and 39 steps, respectively, which significantly improve the …
the first time. The attacks reach 38 and 39 steps, respectively, which significantly improve the …
Privacy preserving data analytics for smart homes
A Chakravorty, T Wlodarczyk… - 2013 IEEE Security and …, 2013 - ieeexplore.ieee.org
A framework for maintaining security & preserving privacy for analysis of sensor data from
smart homes, without compromising on data utility is presented. Storing the personally …
smart homes, without compromising on data utility is presented. Storing the personally …
Preimages for step-reduced SHA-2
In this paper, we present preimage attacks on up to 43-step SHA-256 (around 67% of the
total 64 steps) and 46-step SHA-512 (around 57.5% of the total 80 steps), which significantly …
total 64 steps) and 46-step SHA-512 (around 57.5% of the total 80 steps), which significantly …
Silicon photonic physical unclonable function
Physical unclonable functions (PUFs) serve as a hardware source of private information that
cannot be duplicated and have applications in hardware integrity and information security …
cannot be duplicated and have applications in hardware integrity and information security …
Entropy‐Based Block Scrambling Image Encryption Using DES Structure and Chaotic Systems
X Zhang, L Wang, G Cui, Y Niu - International journal of optics, 2019 - Wiley Online Library
Traditional encryption algorithms are inefficient when applied to image encryption because
image data have the characteristics of large data sizes and strong correlations between …
image data have the characteristics of large data sizes and strong correlations between …
Finding SHA-2 characteristics: searching through a minefield of contradictions
In this paper, we analyze the collision resistance of SHA-2 and provide the first results since
the beginning of the NIST SHA-3 competition. We extend the previously best known semi …
the beginning of the NIST SHA-3 competition. We extend the previously best known semi …
New collision attacks against up to 24-step SHA-2
SK Sanadhya, P Sarkar - Progress in Cryptology-INDOCRYPT 2008: 9th …, 2008 - Springer
In this work, we provide new and improved attacks against 22, 23 and 24-step SHA-2 family
using a local collision given by Sanadhya and Sarkar (SS) at ACISP'08. The success …
using a local collision given by Sanadhya and Sarkar (SS) at ACISP'08. The success …