Integrity verification for digital Holy Quran verses using cryptographic hash function and compression

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Function of music in illustrating verses related to The Day of Judgment in the Holy Quran

Tune of words and music of sentences in the Holy Quran are not the same and they change in accordance with their meaning and intentions. Type of letters, combination of words in the verses and their increase and decrease have an important effect in tune of the verses. This musical reflection will affect readers‘thought and emotion and also sometimes it illustrates a live and dynamic image...

متن کامل

SMASH - A Cryptographic Hash Function

1 This paper presents a new hash function design, which is different from the popular designs of the MD4-family. Seen in the light of recent attacks on MD4, MD5, SHA-0, SHA-1, and on RIPEMD, there is a need to consider other hash function design strategies. The paper presents also a concrete hash function design named SMASH. One version has a hash code of 256 bits and appears to be at least as ...

متن کامل

Memory Integrity Verification Speedup Using Separated L2 Hash Cache

We propose a novel architectural technique in this paper in order to decrease the overhead of memory integrity verification using cached hash trees. We suggest using a separate L2 hash cache to store internal nodes of a hash tree since those nodes show different locality of access than regular application data. Our simulations results indicate that our simple but novel scheme can reduce the ove...

متن کامل

Extracting Topics from the Holy Quran Using Generative Models

The holy Quran is one of the Holy Books of God. It is considered one of the main references for an estimated 1.6 billion of Muslims around the world. The Holy Quran language is Arabic. Specialized as well as non-specialized people in religion need to search and lookup certain information from the Holy Quran. Most research projects concentrate on the translation of the holy Quran in different la...

متن کامل

Ensuring Host Integrity With Cryptographic Provenance Verification∗

We propose a malware detection approach based on the characteristic behaviors of human users. We explore the humanmalware differences and utilize them to aid the detection of infected hosts. There are two main research challenges in this study: one is how to select characteristic behavior features, and the other is how to prevent malware forgeries. We aim to address both questions in this poster.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of King Saud University - Computer and Information Sciences

سال: 2020

ISSN: 1319-1578

DOI: 10.1016/j.jksuci.2018.02.006