IEEE Organizations related to Cryptographic Hash Function

Back to Top

No organizations are currently tagged "Cryptographic Hash Function"



Conferences related to Cryptographic Hash Function

Back to Top

2020 IEEE International Conference on Image Processing (ICIP)

The International Conference on Image Processing (ICIP), sponsored by the IEEE SignalProcessing Society, is the premier forum for the presentation of technological advances andresearch results in the fields of theoretical, experimental, and applied image and videoprocessing. ICIP 2020, the 27th in the series that has been held annually since 1994, bringstogether leading engineers and scientists in image and video processing from around the world.


2020 IEEE International Symposium on Circuits and Systems (ISCAS)

The International Symposium on Circuits and Systems (ISCAS) is the flagship conference of the IEEE Circuits and Systems (CAS) Society and the world’s premier networking and exchange forum for researchers in the highly active fields of theory, design and implementation of circuits and systems. ISCAS2020 focuses on the deployment of CASS knowledge towards Society Grand Challenges and highlights the strong foundation in methodology and the integration of multidisciplinary approaches which are the distinctive features of CAS contributions. The worldwide CAS community is exploiting such CASS knowledge to change the way in which devices and circuits are understood, optimized, and leveraged in a variety of systems and applications.


GLOBECOM 2020 - 2020 IEEE Global Communications Conference

IEEE Global Communications Conference (GLOBECOM) is one of the IEEE Communications Society’s two flagship conferences dedicated to driving innovation in nearly every aspect of communications. Each year, more than 2,900 scientific researchers and their management submit proposals for program sessions to be held at the annual conference. After extensive peer review, the best of the proposals are selected for the conference program, which includes technical papers, tutorials, workshops and industry sessions designed specifically to advance technologies, systems and infrastructure that are continuing to reshape the world and provide all users with access to an unprecedented spectrum of high-speed, seamless and cost-effective global telecommunications services.


2019 20th International Symposium on Quality Electronic Design (ISQED)

20th International Symposium on Quality Electronic Design (ISQED 2019) is the premier interdisciplinary and multidisciplinary Electronic Design conference?bridges the gap among Electronic/Semiconductor ecosystem members providing electronic design tools, integrated circuit technologies, semiconductor technology,packaging, assembly & test to achieve design quality.


2019 IEEE 32nd Computer Security Foundations Symposium (CSF)

Theoretical foundations of computer security and privacy


More Conferences

Periodicals related to Cryptographic Hash Function

Back to Top

No periodicals are currently tagged "Cryptographic Hash Function"


Most published Xplore authors for Cryptographic Hash Function

Back to Top

Xplore Articles related to Cryptographic Hash Function

Back to Top

Cost Effective Hash Chain Based Key Pre-Distribution Scheme for Wireless Sensor Network

2018 IEEE 18th International Conference on Communication Technology (ICCT), 2018

In wireless sensor network (WSN), a secure link in the key pre-distribution (KP) scheme may be compromised when sensor nodes are captured. Accordingly, the KP q- composite scheme was proposed to tackle this node-capture problem. Recently, Bechkit et al. proposed a hash chain based KP (HCKP) q-composite scheme to further enhance network resiliency against node capture. However, Bechkit et al.'s ...


Fast Implementation of LSH With SIMD

IEEE Access, 2019

In this paper, we propose a method of efficient software implementation for the cryptographic hash function LSH with single instruction multiple data (SIMD). The method is based on word-wise permutations of LSH. Using the modified functions Stepj' = P o Stepj o P-1 and MsgExp' instead of the original step function Stepj and message expansion function MsgExp, where P is ...


A Proposal of Blockchain-Based Electronic Voting System

2018 Second World Conference on Smart Trends in Systems, Security and Sustainability (WorldS4), 2018

The Estonian electronic voting system which is a leading electronic voting system still suffers from universal verifiability issues and may need improvement of its availability. To solve the problems, in this paper we propose a blockchain-based electronic voting system. A blockchain is a distributed database, where the complete data is shared among all participants in the network. A blockchain system ...


Scalable Computing in a Blockchain

2018 IEEE 39th Sarnoff Symposium, 2018

The main utility of blockchain networks stem from their ability to offer a trusted platform for execution of processes. The default blockchain implementation, where an immutable log of all transactions is maintained by every participant, is (i) inefficient, and (ii) does not scale well. This paper outlines several strategies to improve the scope and scale of processes that can be ...



Educational Resources on Cryptographic Hash Function

Back to Top

IEEE.tv Videos

EMBC 2011-Keynote-Kamil Ugurbil-Frontiers in Neuroimaging: from Cortical Columns to Whole Brain Function, Connectivity and Morphology
FinSAL: A Novel FinFET Based Secure Adiabatic Logic for Energy-Efficient and DPA Resistant IoT Devices - Himanshu Thapliyal: 2016 International Conference on Rebooting Computing
Octopus-Inspired Robot Can Grasp, Crawl and Swim -- IEEE Spectrum Report
IMS 2015: Wearable electronics - why wear it?
Imaging Human Brain Function with Simultaneous EEG-fMRI - IEEE Brain Workshop
How Symmetry Constrains Evolutionary Optimizers: A Black Box Differential Evolution Case Study - IEEE Congress on Evolutionary Computation 2017
Bari-Bari-II: Jack-Up Rescue Robot with Debris Opening Function
Playing Games with Computational Intelligence
Ponnuthurai Nagaratnam Suganthan - Differential Evolution
A Closer Look at NFV Execution Models - Zhi-Li Zhang - IEEE Sarnoff Symposium, 2019
The EU Human Brain Project - A Systematic Path from Data to Synthesis
IEEE 125th Anniversary Media Event: Brain-Machine Interface Technology
Ted Berger: Far Futures Panel - Technologies for Increasing Human Memory - TTM 2018
Multi-Function VCO Chip for Materials Sensing and More - Jens Reinstaedt - RFIC Showcase 2018
Resistive Coupled VO2 Oscillators for Image Recognition - Elisabetta Corti - ICRC 2018
Regular Expression Matching with Memristor TCAMs - Cat Graves - ICRC 2018
Radiated Emissions as Function of Common Mode Current - EMC Society Demo
Capture, Recognition, and Imitation of Anthropomorphic Motion
Security for SDN/NFV and 5G Networks - Ashutosh Dutta - India Mobile Congress, 2018
A 30-MHz-to-3-GHz CMOS Array Receiver with Frequency and Spatial Interference Filtering for Adaptive Antenna Systems: RFIC Industry Showcase

IEEE-USA E-Books

  • Cost Effective Hash Chain Based Key Pre-Distribution Scheme for Wireless Sensor Network

    In wireless sensor network (WSN), a secure link in the key pre-distribution (KP) scheme may be compromised when sensor nodes are captured. Accordingly, the KP q- composite scheme was proposed to tackle this node-capture problem. Recently, Bechkit et al. proposed a hash chain based KP (HCKP) q-composite scheme to further enhance network resiliency against node capture. However, Bechkit et al.'s HCKP q-composite scheme has to perform too many hash operations to establish a secure link between two nodes for the case that the difference of node identifiers is large. This computational overhead is more serious for the large value of q. In this paper, we propose a computational overhead invariant HCKP q-composite scheme by storing one additional hashed value in sensor node. When compared with Bechkit et al.'s HCKP q-composite scheme, the proposed scheme reduces the number of hash operations, and meanwhile the storage overhead remains insignificant.

  • Fast Implementation of LSH With SIMD

    In this paper, we propose a method of efficient software implementation for the cryptographic hash function LSH with single instruction multiple data (SIMD). The method is based on word-wise permutations of LSH. Using the modified functions Stepj' = P o Stepj o P-1 and MsgExp' instead of the original step function Stepj and message expansion function MsgExp, where P is a permutation and P-1 is the inverse permutation of P, we show that the number of the SIMD instructions for implementing LSH is reduced. For efficient implementation of LSH in other environments (e.g., MIMD), various types of word permutations are listed.

  • A Proposal of Blockchain-Based Electronic Voting System

    The Estonian electronic voting system which is a leading electronic voting system still suffers from universal verifiability issues and may need improvement of its availability. To solve the problems, in this paper we propose a blockchain-based electronic voting system. A blockchain is a distributed database, where the complete data is shared among all participants in the network. A blockchain system by its nature has several advantages that suit an electronic voting system. Its distributed architecture provides high availability to the system because it does not rely on a centralized server. As all participants have complete data, the protocol allows them to verify each block that is appended to the chain. We try to combine the double envelope encryption technique and blockchain technology for our proposed electronic voting system.

  • Scalable Computing in a Blockchain

    The main utility of blockchain networks stem from their ability to offer a trusted platform for execution of processes. The default blockchain implementation, where an immutable log of all transactions is maintained by every participant, is (i) inefficient, and (ii) does not scale well. This paper outlines several strategies to improve the scope and scale of processes that can be executed in a blockchain.



Standards related to Cryptographic Hash Function

Back to Top

No standards are currently tagged "Cryptographic Hash Function"


Jobs related to Cryptographic Hash Function

Back to Top