-
41
Keamanan Data Menggunakan Secure Hashing Algorithm (SHA)-256 dan Rivest Shamir Adleman (RSA) pada Digital Signature
Published 2023-12-01“…This helps maintain the authenticity of documents so that others cannot copy them. To prevent letter forgery, data integrity, and data validity, the contents of protected documents are encoded using the SHA-256 and RSA cryptographic algorithms. …”
Get full text
Article -
42
Hellenistic and Roman gems and jewellery from south-western Turkey
Published 2024-09-01“…The final two parts of the paper describe two forgeries and then the bezel of a finger‑ring and a clay bulla, both of which are of Hellenistic date…”
Article -
43
Strongly Unforgeable Ring Signature Scheme from Lattices in the Standard Model
Published 2014-01-01“…To date, various ring signature schemes have been proposed, all considered to be secure as existentially unforgeable with respect to insider corruption; that is, an adversary who chooses ring-message pairs for which he requests signatures, corrupts honest users, and obtains their signing keys can not produce forgeries for new ring-message pairs. Lattice-based ring signature schemes offer lower computational overhead and security from quantum attacks. …”
Get full text
Article -
44
A Secure Learned Image Codec for Authenticity Verification via Self-Destructive Compression
Published 2025-01-01“…Our experiments demonstrate that SLIC holds significant promise as a proactive defense strategy against image manipulation, offering a new approach to enhancing image credibility and authenticity in a media landscape increasingly dominated by AI-driven forgeries.…”
Get full text
Article -
45
Dva příběhy z kriminálního podsvětí – padělatelé peněz na hradě Žampachu a přepadání Židů v roce 1542
Published 2010-07-01“…In the workshop they minted Görlitz black money, Viennese money (1⁄2 kreutzer) and the Austrian groschen (3 kreutzers). These forgeries were exchanged for real money at the ratio of 2 : 1. …”
Get full text
Article