Essays about: "Hashing algorithms"
Showing result 1 - 5 of 6 essays containing the words Hashing algorithms.
-
1. Time-based Key for Coverless Audio Steganography: A Proposed Behavioral Method to Increase Capacity
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background. Coverless steganography is a relatively unexplored area of steganography where the message is not embedded into a cover media. Instead the message is derived from one or several properties already existing in the carrier media. This renders steganalysis methods used for traditional steganography useless. READ MORE
-
2. Clueless: A Tool Characterising Values Leaking as Addresses : Clueless: A Tool Characterising Values Leaking as Addresses
University essay from Uppsala universitet/Institutionen för informationsteknologiAbstract : A fundamental programming feature that allows Spectre to effortlessly leak the value of secrets via cache side channels is the transformation of data values into addresses. Consider forexample sorting, hashing, or many other algorithms that create addresses based on datavalues. READ MORE
-
3. An analysis of reported phishing domains
University essay from Linköpings universitet/Institutionen för datavetenskapAbstract : As we become more digitalized and we rely more heavily on the internet, the more important it is to protect ourselves against phishing attacks and other types of internet frauds. Users who fall for phishing attacks risk getting sensitive information stolen such as their bank accounts. READ MORE
-
4. Hashing algorithms : A comparison for blockchains in Internet of things
University essay from Mittuniversitetet/Avdelningen för informationssystem och -teknologiAbstract : In today’s society blockchains and the Internet of things are two very discussed subjects this has led to thoughts about combining them by using a blockchain in Internet of things. This objective of this study has been to solve the problem which hashing algorithms is the best for a blockchain used in an Internet of things network. READ MORE
-
5. Investigation of cryptographic algorithms for the transfer of financial information
University essay from Linnéuniversitetet/Institutionen för datavetenskap, fysik och matematik, DFMAbstract : The purpose of the investigation is to determine the most effective solution, which allows safe storing and transmitting of financial information in terms of execution speed, resistance to hacking and ease of implementation. Research object is subject area related to the transfer of encrypted financial information like: encryption algorithms, algorithm of hashing functions, algorithm of electronic digital signature. READ MORE