Essays about: "Hashing algorithms"

Showing result 1 - 5 of 6 essays containing the words Hashing algorithms.

  1. 1. Time-based Key for Coverless Audio Steganography: A Proposed Behavioral Method to Increase Capacity

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : John Alanko Öberg; Carl Svensson; [2023]
    Keywords : Coverless audio steganography; information hiding; covert communication; effective capacity; behavioral; Täcklös ljudsteganografi; informationsdöljning; hemlig kommunikation; effektiv kapacitet; beteendemässig;

    Abstract : Background. Coverless steganography is a relatively unexplored area of steganography where the message is not embedded into a cover media. Instead the message is derived from one or several properties already existing in the carrier media. This renders steganalysis methods used for traditional steganography useless. READ MORE

  2. 2. Clueless: A Tool Characterising Values Leaking as Addresses : Clueless: A Tool Characterising Values Leaking as Addresses

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Xiaoyue Chen; [2022]
    Keywords : ;

    Abstract : A fundamental programming feature that allows Spectre to effortlessly leak the value of secrets via cache side channels is the transformation of data values into addresses. Consider forexample sorting, hashing, or many other algorithms that create addresses based on datavalues. READ MORE

  3. 3. An analysis of reported phishing domains

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Tim Hellberg; Daniel Keyvanpour; [2019]
    Keywords : ;

    Abstract : As we become more digitalized and we rely more heavily on the internet, the more important it is to protect ourselves against phishing attacks and other types of internet frauds. Users who fall for phishing attacks risk getting sensitive information stolen such as their bank accounts. READ MORE

  4. 4. Hashing algorithms : A comparison for blockchains in Internet of things

    University essay from Mittuniversitetet/Avdelningen för informationssystem och -teknologi

    Author : Karl Dahlin; [2018]
    Keywords : Internet of things; Blockchain; Hash; Hashing algorithms; MD5; SHA; C ; Matlab;

    Abstract : In today’s society blockchains and the Internet of things are two very discussed subjects this has led to thoughts about combining them by using a blockchain in Internet of things. This objective of this study has been to solve the problem which hashing algorithms is the best for a blockchain used in an Internet of things network. READ MORE

  5. 5. Investigation of cryptographic algorithms for the transfer of financial information

    University essay from Linnéuniversitetet/Institutionen för datavetenskap, fysik och matematik, DFM

    Author : Mykola Martynenko; [2010]
    Keywords : encryption; cryptography; hashing; client; server; compressing; digital signature;

    Abstract : The purpose of the investigation is to determine the most effective solution, which allows safe storing and transmitting of financial information in terms of execution speed, resistance to hacking and ease of implementation. Research object is subject area related to the transfer of encrypted financial information like: encryption algorithms, algorithm of hashing functions, algorithm of electronic digital signature. READ MORE