Showing 1 - 2 results of 2 for search 'cryptographic has function sha-1~', query time: 1.12s Refine Results
  1. 1

    Combined formаtion of a cryptographic key using synchronized artificial neural networks by M. L. Radziukevich, V. F. Golikov

    Published 2021-02-01
    “…In this paper, possible vulnerabilities of the basic method of forming a cryptographic key using synchronized artificial neural networks are considered, their danger is assessed, and a correction of the method is proposed to ensure the required confidentiality of the generated shared secret. …”
    Get full text
    Article
  2. 2

    Boolean semiring key-exchange with BLAKE3 security (BKEX-B3) by Alvary Kefas Kwala, Alpna Mishra, Shri Kant

    Published 2025-07-01
    “…This work presents a new Boolean Semiring Key Exchange Protocol combined with BLAKE3 cryptographic hash function (BKEX-B3). The protocol leverages the flexibility of BLAKE3’s eXtendable Output Function (XOF) and the nonlinearity of Boolean algebra to produce a flexible, quantum-resistant solution capable of dynamically adapting security levels to advancement in quantum algorithms. …”
    Get full text
    Article