Methods of privacy-preserving genomic sequencing data alignments
D Lu, Y Zhang, L Zhang, H Wang… - Briefings in …, 2021 - academic.oup.com
Genomic data alignment, a fundamental operation in sequencing, can be utilized to map
reads into a reference sequence, query on a genomic database and perform genetic tests …
reads into a reference sequence, query on a genomic database and perform genetic tests …
A deep-learning-based image forgery detection framework for controlling the spread of misinformation
Purpose Web users rely heavily on online content make decisions without assessing the
veracity of the content. The online content comprising text, image, video or audio may be …
veracity of the content. The online content comprising text, image, video or audio may be …
DEVELOPMENT AND ANALYSIS OF THE NEW HASHING ALGORITHM BASED ON BLOCK CIPHER.
K Sakan, S Nyssanbayeva… - Eastern-European …, 2022 - search.ebscohost.com
This paper proposes the new hash algorithm HBC256 (Hash based on Block Cipher) based
on the symmetric block cipher of the CF (Compression Function). The algorithm is based on …
on the symmetric block cipher of the CF (Compression Function). The algorithm is based on …
Merkle Trees in Blockchain: A Study of Collision Probability and Security Implications
O Kuznetsov, A Rusnak, A Yezhov, K Kuznetsova… - Internet of Things, 2024 - Elsevier
In the rapidly evolving landscape of blockchain technology, ensuring the integrity and
security of data is paramount. This study delves into the security aspects of Merkle Trees, a …
security of data is paramount. This study delves into the security aspects of Merkle Trees, a …
Evaluating the security of Merkle-Damgård hash functions and combiners in quantum settings
In this work, we evaluate the security of Merkle-Damgård (MD) hash functions and their
combiners (XOR and concatenation combiners) in quantum settings. Two main quantum …
combiners (XOR and concatenation combiners) in quantum settings. Two main quantum …
Improving Generic Attacks Using Exceptional Functions
X Bonnetain, RH Boissier, G Leurent… - Cryptology ePrint …, 2024 - eprint.iacr.org
Over the past ten years, the statistical properties of random functions have been particularly
fruitful for generic attacks. Initially, these attacks targeted iterated hash constructions and …
fruitful for generic attacks. Initially, these attacks targeted iterated hash constructions and …
Brand New Categories of Cryptographic Hash Functions: A Survey
B Sefid-Dashti, J Salimi Sartakhti… - Journal of Electrical and …, 2023 - jecei.sru.ac.ir
Background and Objectives: Cryptographic hash functions are the linchpins of mobile
services, blockchains, and many other technologies. Designing cryptographic hash …
services, blockchains, and many other technologies. Designing cryptographic hash …
A Second Preimage Attack on the XOR Hash Combiner
S Chen, T Cui, C Jin, C Wang - IET Information Security, 2024 - Wiley Online Library
The exclusive‐or (XOR) hash combiner is a classical hash function combiner, which is well
known as a good PRF and MAC combiner, and is used in practice in TLS versions 1.0 and …
known as a good PRF and MAC combiner, and is used in practice in TLS versions 1.0 and …
Quantum attacks on hash constructions with low quantum random access memory
X Dong, S Li, P Pham, G Zhang - … on the Theory and Application of …, 2023 - Springer
Abstract At ASIACRYPT 2022, Benedikt, Fischlin, and Huppert proposed the quantum
herding attacks on iterative hash functions for the first time. Their attack needs exponential …
herding attacks on iterative hash functions for the first time. Their attack needs exponential …
Мультикомп'ютерна система згідно топології «сніжинка»
СВ Коцюрба - 2023 - elar.khmnu.edu.ua
Анотація Мета кваліфікаційної роботи полягає в розробці мультикомп'ютерних систем
на базі топології «сніжинка». Тема створення мультикомп'ютерні системи на базі …
на базі топології «сніжинка». Тема створення мультикомп'ютерні системи на базі …