scholarly journals Controlled Alternate Quantum Walks based Quantum Hash Function

2018 ◽  
Vol 8 (1) ◽  
Author(s):  
Dan Li ◽  
Yu-Guang Yang ◽  
Jing-Lin Bi ◽  
Jia-Bin Yuan ◽  
Juan Xu
2019 ◽  
Vol 58 (6) ◽  
pp. 1861-1873 ◽  
Author(s):  
Yu-Guang Yang ◽  
Jing-Lin Bi ◽  
Dan Li ◽  
Yi-Hua Zhou ◽  
Wei-Min Shi
Keyword(s):  

2018 ◽  
Vol 17 (8) ◽  
Author(s):  
Yu-Guang Yang ◽  
Jing-Lin Bi ◽  
Xiu-Bo Chen ◽  
Zheng Yuan ◽  
Yi-Hua Zhou ◽  
...  

2020 ◽  
pp. 61-71
Author(s):  
K. Shankar ◽  

The security with the protection of IoT is to stay a consequential test, for the most part, because of the huge scale and dispersed nature of IoT systems. A cloud server brings wide pertinence of IoT in numerous businesses just as Government parts. Be that as it may, the security concerns, for example, verification and information protection of these gadgets assume a key job in fruitful coordination of two innovations. To build the security here, a quantum hash work system and hybrid cuckoo search-Artificial Bee Colony algorithm is displayed. A quantum hash work has been presented as an amazing system for secure correspondence of IoT and cloud because of its irregular disordered robust execution, greater affectability for introductory authority dimension, steadiness, and the exceptionally huge crucial area is hypothetically sufficiently able to oppose different known assaults. Cloud servers utilizing CS-ABC to upgrading the safe calculations through a quantum channel inside the cloud framework. Execution examinations and recreation outcomes demonstrate our presented methods are portrayed and also have greater safety, proficiency with strength opposed to a few surely understood assaults which choose them as a great contender for verifying cloud and IoT applications.


2019 ◽  
Vol 59 (2) ◽  
pp. 635-648
Author(s):  
Yalan Wang ◽  
Yuling Chen ◽  
Zhanhong Wei ◽  
Haseeb Ahmad

2020 ◽  
Vol 3 (2) ◽  
pp. 182-186
Author(s):  
Lisnayani Silalahi ◽  
Anita Sindar

Data security and confidentiality is currently a very important issue and continues to grow. Several cases concerning data security are now a job that requires handling and security costs that are so large. To maintain the security and confidentiality of messages, data, or information so that no one can read or understand it, except for the rightful recipients, a data security system application with an encryption method using an algorithm is designed. The SHA-1 cryptographic hash function that takes input and produces a 160-bit hash value which is known as the message iteration is usually rendered as a 40-digit long hexadecimal number.


Sign in / Sign up

Export Citation Format

Share Document