Results 91 to 100 of about 45,527 (206)

Study About the Performance of Ascon in Arduino Devices

open access: yesApplied Sciences
In 2023, the Ascon cipher suite was selected as the winner of the National Institute of Standards and Technology (NIST) standardization process for lightweight cryptography, and has emerged as the leading candidate for cryptographic algorithms in ...
Ventura Sarasa Laborda   +4 more
doaj   +1 more source

S-HASH: A Crack Towards Cryptographic Hash Functions

open access: yesCSVTU Research Journal on Engineering and Technology, 2021
Kaushal Jangid, Vidushi .
openaire   +1 more source

Evaluation and design of cryptographic hash functions

open access: yes, 2010
Une fonction de hachage est une fonction prenant comme argument un élément de taille arbitraire finie et renvoyant un élément de longueur fixée. Il existe différents types de fonctions de hachage qui correspondent à autant de domaines d'utilisation.
openaire   +2 more sources

Analysis of cryptographic hash functions

open access: yes, 2012
The National Institute of Standards and Technology (NIST) launched in 2008 a public competition, called the SHA-3 competition, aiming at definining a new standard for hash functions. We study here the algebraic properties of some of the candidates to this contest. Among the functions analyzed, is the Keccak algorithm, which was recently announced to be
openaire   +1 more source

Optimising the SHA-512 cryptographic hash function on FPGAs

open access: yesIET Computers & Digital Techniques, 2013
G. Athanasiou   +3 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy