Efficient full data-path width and serialized hardware structures of SPONGENT lightweight hash function

2021 ◽  
pp. 105167
Author(s):  
Bahram Rashidi
Keyword(s):  
2020 ◽  
Vol 3 (2) ◽  
pp. 182-186
Author(s):  
Lisnayani Silalahi ◽  
Anita Sindar

Data security and confidentiality is currently a very important issue and continues to grow. Several cases concerning data security are now a job that requires handling and security costs that are so large. To maintain the security and confidentiality of messages, data, or information so that no one can read or understand it, except for the rightful recipients, a data security system application with an encryption method using an algorithm is designed. The SHA-1 cryptographic hash function that takes input and produces a 160-bit hash value which is known as the message iteration is usually rendered as a 40-digit long hexadecimal number.


2016 ◽  
Vol 11 (1) ◽  
pp. 56 ◽  
Author(s):  
Yasir Amer Abbas ◽  
Razali Jidin ◽  
Norziana Jamil ◽  
Muhammad Reza Z'aba
Keyword(s):  

2012 ◽  
Vol 35 (9) ◽  
pp. 1868 ◽  
Author(s):  
Wei YU ◽  
Kun-Peng WANG ◽  
Bao LI ◽  
Song TIAN
Keyword(s):  

2013 ◽  
Vol 33 (5) ◽  
pp. 1350-1352
Author(s):  
Peng LIU ◽  
Changhong ZHANG ◽  
Qingyu OU

Author(s):  
Keith M. Martin

This chapter discusses cryptographic mechanisms for providing data integrity. We begin by identifying different levels of data integrity that can be provided. We then look in detail at hash functions, explaining the different security properties that they have, as well as presenting several different applications of a hash function. We then look at hash function design and illustrate this by discussing the hash function SHA-3. Next, we discuss message authentication codes (MACs), presenting a basic model and discussing basic properties. We compare two different MAC constructions, CBC-MAC and HMAC. Finally, we consider different ways of using MACs together with encryption. We focus on authenticated encryption modes, and illustrate these by describing Galois Counter mode.


2021 ◽  
Vol 7 (2) ◽  
pp. 111
Author(s):  
María Jesús Carrasco-Santos ◽  
Antonio Manuel Ciruela-Lorenzo ◽  
Juan Gabriel Méndez Pavón ◽  
Carmen Cristófol Rodríguez

This research analyzed the online reputation of Marbella as a tourist destination and the profiles of the reviewers according to sociodemographic characteristics. A correlational, quantitative research technique was used in this study based on the manual extraction of more than 4000 reviews generated on TripAdvisor. The data used in this study were collected from the TripAdvisor website, taking, as a sample, tourists who had visited the city in the last three years. Ratings that did not provide full data on the variables were excluded. The findings show that Marbella is considered a luxury shopping destination. The preliminary conclusions allow us to generalize about the sociodemographic profile of its tourists. The findings of the study will provide valuable information for Marbella’s Destination Management Organization (DMO). On the one hand, this study highlights the importance of ranking the attractions of the city to create better communication strategies and enhance the appeal of those attractions that receive the best ratings, establishing the true vocation of Marbella as a tourist destination. On the other hand, it provides information on what tourists perceive to be negative elements, allowing the administration to create an improvement plan. The novelty of this research paper is that it delves into Marbella’s online reputation through an analysis of specific attractions’ ratings. Areas that require further attention in future research have been highlighted, along with specific advice on each attraction that contributes to the tourist offerings of the city.


Sign in / Sign up

Export Citation Format

Share Document