A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2012; you can also visit the original URL.
The file type is application/pdf
.
Filters
Efficient Negative Databases from Cryptographic Hash Functions
[chapter]
Lecture Notes in Computer Science
cryptographic hash functions or the hardness of the Discrete-Logarithm problem. ...
A negative database is a privacy-preserving storage system that allows to efficiently test if an entry is present, but makes it hard to enumerate all encoded entries. ...
Negative Databases from Cryptographic Hash Functions Cryptographic hash functions such as SHA-256 [14, 16] and RIPEMD-160 [7, 14] are widely used cryptographic primitives. ...
doi:10.1007/978-3-540-75496-1_28
fatcat:tybcaxzoivatzal7xaaimvgc5y
Strong Authentication using Encrypted Negative Password
2020
VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE
Passwords are usually in the kind of hashed passwords. ...
Because Passwords could also be leaked from weak systems. passwords that are given by a human is easy to identified and cracked. ...
For a convenient and the safe arcanum the author proposed a hash password employing hash function based on a cryptographic method is more efficient to use the method directly from a hashed password to ...
doi:10.35940/ijitee.f4123.049620
fatcat:uzibq66d6bfrpipd6m7vz2fb4e
Privacy-Enhanced Robust Image Hashing with Bloom Filters
2021
Journal of Cyber Security and Mobility
We choose a cryptographic hash function to one-way encrypt and store elements. The privacy of the inserted elements is thus protected. ...
Robust image hashes are used to detect known illegal images, even after image processing. ...
Acknowledgment This publication derived from the master thesis of the main author [34] , supervised by the additional authors. This work is partially taken from it, e.g. ...
doi:10.13052/jcsm2245-1439.1014
fatcat:hr326brs6zaa3dqgtduamkmrdm
Security Aspects of Piecewise Hashing in Computer Forensics
2011
2011 Sixth International Conference on IT Security Incident Management and IT Forensics
As of today, in a pre-step process hash values of files are generated and stored in a database; typically a cryptographic hash function like MD5 or SHA-1 is used. ...
Later the investigator computes hash values of files, which he finds on a storage medium, and performs look ups in his database. ...
Anti-Blacklisting Anti-blacklisting means that we are able to efficiently generate false negatives from Kornblum's point of view. To explain this let a known-to-be-bad file F 1 be given. ...
doi:10.1109/imf.2011.16
dblp:conf/imf/BaierB11
fatcat:my7mmoofrzcrxhrbb62tuwk4ae
Privacy and Robust Hashes
2020
Journal of Cyber Security and Mobility
The advantage of a cryptographic hash function is in turn that its values do not allow any conclusions about the structure of an image. ...
Cryptographic hash functions, on the other hand, create a unique bit-sensitive value. With these, no similarity measurement is possible, since only with exact agreement a picture is found. ...
Cryptographic Hash We need a cryptographic hash function that hashes the preceding robust hashes. ...
doi:10.13052/jcsm2245-1439.914
fatcat:wq5xpbfvnrbqbdweazh6whyhgm
Hashing Techniques
2017
ACM Computing Surveys
Hashing techniques have also evolved from simple randomization approaches to advanced adaptive methods considering locality, structure, label information, and data security, for effective hashing. ...
With the rapid development of information storage and networking technologies, quintillion bytes of data are generated every day from social networks, business transactions, sensors, and many other domains ...
So cryptographically insecure hashing is often much more efficient than cryptographically secure hashing. ...
doi:10.1145/3047307
fatcat:u5asusjs7vdq7f3a6wgnesnodq
On the database lookup problem of approximate matching
2014
Digital Investigation. The International Journal of Digital Forensics and Incident Response
Besides identifying exact duplicates, which is mostly solved using cryptographic hash functions, it is also helpful to detect similar data by applying approximate matching. ...
In contrast, cryptographic hash values are stored within binary trees or hash tables and hence the lookup complexity of a single digest is O(log 2 (x)) or O(1), respectively. ...
Efficiency in general Let S D denote the hashes of files from a device and let S B denote database set (i.e., the blacklist). ...
doi:10.1016/j.diin.2014.03.001
fatcat:gzuqav35xvavzgkngohtrlbut4
Open Sesame: The Password Hashing Competition and Argon2
[article]
2016
arXiv
pre-print
In this document we present an overview of the background to and goals of the Password Hashing Competition (PHC) as well as the design of its winner, Argon2, and its security requirements and properties ...
The initial measure aimed at limiting the impact of database breaches was the usage of cryptographic hash functions for password storage [7] where passwords aren't stored as plaintext but as a hash digest ...
Cryptographic Security Collision resistance: In the initial stage inputs are processed by the hash function ℋ defined as the BLAKE2b function which is considered cryptographically secure. ...
arXiv:1602.03097v2
fatcat:cvsjzq4wifbp7kkcktsuiisy7a
Accountable certificate management using undeniable attestations
2000
Proceedings of the 7th ACM conference on Computer and communications security - CCS '00
Our main contribution is a model for accountable certificate management, where clients receive attestations confirming inclusion/removal of their certificates from the database of valid certificates. ...
Moreover, authenticated search trees can be used in many security-critical applications instead of the (sorted) hash trees to reduce trust in the authorities, without decrease in efficiency. ...
hash function is used. ...
doi:10.1145/352600.352604
dblp:conf/ccs/BuldasLL00
fatcat:nfa3npax6ngh3mtn7ihvohgoc4
Performance Issues About Context-Triggered Piecewise Hashing
[chapter]
2012
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
As of today, in a pre-step process hash values of files are generated and stored in a database; typically a cryptographic hash function like MD5 or SHA-1 is used. ...
Due to security properties of cryptographic hash functions, they can not be used to identify similar files. ...
So his changes influence the efficiency in a negative way. Furthermore, Roussev used the cryptographic hash function MD5 for processing each chunk instead of the FNV-Hash. ...
doi:10.1007/978-3-642-35515-8_12
fatcat:zktbzo4tmvd3zjngrsgfsag6zi
Similarity hash based scoring of portable executable files for efficient malware detection in IoT
2019
Future generations computer systems
This paper explores four hash types currently used in malware analysis for portable executable (PE) files. ...
Although each hashing technique produces interesting results, when applied independently, they have high false detection rates. ...
sum
HFlag_set (H) The flag setting function for hash type, H
PopHdb
Populating Malicious files Hash Database Function
HbDR
Hash Based Comparison Detection Rates Function
ic
Hash of type, I, e.g ...
doi:10.1016/j.future.2019.04.044
fatcat:mnnxoxrnazfw3hosea3xjvciaq
Secure Login System using MD5 and AES Attribute Based Encryption Algorithm
2020
VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE
In our system, first, the got plain secret key from a customer is worked out a cryptographic hash work. At that point; the hashed secret word is changed over into a negative secret word. ...
The cryptographic hash work and symmetric encryption make it hard to split passwords from ENPs.We are going to use message digest i.e MD5 and AES algorithm for this purpose. ...
By using cryptographic function that hashes the plain format of password and symmetric encryption we will try to make the system more secure and efficient.
V. ...
doi:10.35940/ijitee.h6509.069820
fatcat:rpnxv7bppzchrehxrntxxcwqxi
BlockChain for Improved Platoon Security
2018
International Journal of Information Systems and Computer Sciences
We have identified key protocols for a distributed cryptographic authentication among vehicles in transit within a platoon. ...
Every block of the blockchain will contain cryptographic hash function for the former block as well as cryptographic hash function for the current data to be sent. ...
The component labeled sorting and classification function will match the PK with the one PC already holds in its database of platoon formation. ...
doi:10.30534/ijiscs/2018/01722018
fatcat:o6iu22y6rna6bk53jpirdoe33a
Web Application Vulnerability Detection Using Hybrid String Matching Algorithm
2018
International Journal of Engineering & Technology
The web application incorporates a rundown of cryptographic hashes of legitimate (trusted) client side contents. In the event that there is a cryptographic hash for the content in the white list. ...
injecting the mischievous XSS assault vectors in such infusion focuses and check for these assaults in the helpless web application( Shashank Gupta et.al 2015).The proposed application improve the false negative ...
The web application includes a list of cryptographic hashes of valid (trusted) client side scripts. ...
doi:10.14419/ijet.v7i3.6.14950
fatcat:lclvekqoeze3zj2sn67sxbuyde
Designing an Algorithm to Preserve Privacy for Medical Record Linkage With Error-Prone Data
2014
JMIR Medical Informatics
In the Data Matching Module, for error-free data, our solution offered two different choices for cryptographic schemes. ...
The experimental results showed that it is reliable and efficient. The design of our software is open so that the existing textual matching methods can be easily integrated into the system. ...
Multimedia Appendix 1 Snapshot of selecting a function in our system.
Multimedia Appendix 2 Snapshot of selecting a collaborator. ...
doi:10.2196/medinform.3090
pmid:25600786
pmcid:PMC4288117
fatcat:3gv3dpbhyvamxfghawipx4bwje
« Previous
Showing results 1 — 15 out of 5,081 results