Methods of privacy-preserving genomic sequencing data alignments

D Lu, Y Zhang, L Zhang, H Wang… - Briefings in …, 2021 - academic.oup.com
Genomic data alignment, a fundamental operation in sequencing, can be utilized to map
reads into a reference sequence, query on a genomic database and perform genetic tests …

A deep-learning-based image forgery detection framework for controlling the spread of misinformation

A Ghai, P Kumar, S Gupta - Information Technology & People, 2024 - emerald.com
Purpose Web users rely heavily on online content make decisions without assessing the
veracity of the content. The online content comprising text, image, video or audio may be …

DEVELOPMENT AND ANALYSIS OF THE NEW HASHING ALGORITHM BASED ON BLOCK CIPHER.

K Sakan, S Nyssanbayeva… - Eastern-European …, 2022 - search.ebscohost.com
This paper proposes the new hash algorithm HBC256 (Hash based on Block Cipher) based
on the symmetric block cipher of the CF (Compression Function). The algorithm is based on …

Merkle Trees in Blockchain: A Study of Collision Probability and Security Implications

O Kuznetsov, A Rusnak, A Yezhov, K Kuznetsova… - Internet of Things, 2024 - Elsevier
In the rapidly evolving landscape of blockchain technology, ensuring the integrity and
security of data is paramount. This study delves into the security aspects of Merkle Trees, a …

Evaluating the security of Merkle-Damgård hash functions and combiners in quantum settings

Z Bao, J Guo, S Li, P Pham - … Conference on Network and System Security, 2022 - Springer
In this work, we evaluate the security of Merkle-Damgård (MD) hash functions and their
combiners (XOR and concatenation combiners) in quantum settings. Two main quantum …

Improving Generic Attacks Using Exceptional Functions

X Bonnetain, RH Boissier, G Leurent… - Cryptology ePrint …, 2024 - eprint.iacr.org
Over the past ten years, the statistical properties of random functions have been particularly
fruitful for generic attacks. Initially, these attacks targeted iterated hash constructions and …

Brand New Categories of Cryptographic Hash Functions: A Survey

B Sefid-Dashti, J Salimi Sartakhti… - Journal of Electrical and …, 2023 - jecei.sru.ac.ir
Background and Objectives: Cryptographic hash functions are the linchpins of mobile
services, blockchains, and many other technologies. Designing cryptographic hash …

A Second Preimage Attack on the XOR Hash Combiner

S Chen, T Cui, C Jin, C Wang - IET Information Security, 2024 - Wiley Online Library
The exclusive‐or (XOR) hash combiner is a classical hash function combiner, which is well
known as a good PRF and MAC combiner, and is used in practice in TLS versions 1.0 and …

Quantum attacks on hash constructions with low quantum random access memory

X Dong, S Li, P Pham, G Zhang - … on the Theory and Application of …, 2023 - Springer
Abstract At ASIACRYPT 2022, Benedikt, Fischlin, and Huppert proposed the quantum
herding attacks on iterative hash functions for the first time. Their attack needs exponential …

Мультикомп'ютерна система згідно топології «сніжинка»

СВ Коцюрба - 2023 - elar.khmnu.edu.ua
Анотація Мета кваліфікаційної роботи полягає в розробці мультикомп'ютерних систем
на базі топології «сніжинка». Тема створення мультикомп'ютерні системи на базі …