Integrity verification for digital Holy Quran verses using cryptographic hash function and compression
نویسندگان
چکیده
منابع مشابه
Function of music in illustrating verses related to The Day of Judgment in the Holy Quran
Tune of words and music of sentences in the Holy Quran are not the same and they change in accordance with their meaning and intentions. Type of letters, combination of words in the verses and their increase and decrease have an important effect in tune of the verses. This musical reflection will affect readers‘thought and emotion and also sometimes it illustrates a live and dynamic image...
متن کاملSMASH - A Cryptographic Hash Function
1 This paper presents a new hash function design, which is different from the popular designs of the MD4-family. Seen in the light of recent attacks on MD4, MD5, SHA-0, SHA-1, and on RIPEMD, there is a need to consider other hash function design strategies. The paper presents also a concrete hash function design named SMASH. One version has a hash code of 256 bits and appears to be at least as ...
متن کاملMemory Integrity Verification Speedup Using Separated L2 Hash Cache
We propose a novel architectural technique in this paper in order to decrease the overhead of memory integrity verification using cached hash trees. We suggest using a separate L2 hash cache to store internal nodes of a hash tree since those nodes show different locality of access than regular application data. Our simulations results indicate that our simple but novel scheme can reduce the ove...
متن کاملExtracting Topics from the Holy Quran Using Generative Models
The holy Quran is one of the Holy Books of God. It is considered one of the main references for an estimated 1.6 billion of Muslims around the world. The Holy Quran language is Arabic. Specialized as well as non-specialized people in religion need to search and lookup certain information from the Holy Quran. Most research projects concentrate on the translation of the holy Quran in different la...
متن کاملEnsuring Host Integrity With Cryptographic Provenance Verification∗
We propose a malware detection approach based on the characteristic behaviors of human users. We explore the humanmalware differences and utilize them to aid the detection of infected hosts. There are two main research challenges in this study: one is how to select characteristic behavior features, and the other is how to prevent malware forgeries. We aim to address both questions in this poster.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of King Saud University - Computer and Information Sciences
سال: 2020
ISSN: 1319-1578
DOI: 10.1016/j.jksuci.2018.02.006