Results 71 to 80 of about 750 (85)

Integrity verified lightweight ciphering for secure medical image sharing between embedded SoCs. [PDF]

open access: yesSci Rep
Janakiraman S   +5 more
europepmc   +1 more source

Method of security storage of information on digital media [PDF]

open access: yes, 2019
Kupchak, Y.   +3 more
core  

Analysis of RIPEMD-160: New Collision Attacks and Finding Characteristics with MILP

open access: yesAnalysis of RIPEMD-160: New Collision Attacks and Finding Characteristics with MILP
identifier:oai:t2r2.star.titech.ac.jp ...
openaire  
Some of the next articles are maybe not open access.

High-throughput implementation of the RIPEMD-160

International Journal of Internet Technology and Secured Transactions, 2009
One-way hash functions are the main cryptographic primitives which are used in the network protocols for user authentication and message integration. In the literature, implementations have been proposed either in hardware or software. The rich number of implementations is expected considering the number of constraints of a target application. When the
Kakarountas, Athanasios P.   +3 more
openaire   +2 more sources

Multiple Securities for Cloud Computing Using RIPEMD-160

SSRN Electronic Journal, 2017
Cloud facing many new security threats day by day the threats are vulnerable and reduces the confidentiality of the cloud secure cloud from these various attacks, here a multiple security aspect is proposed to make the cloud more secure. There are dozens of security has been reported till now, in that in this paper it is tried to secure the cloud from ...
Sri Prasadh, S. Sivasubramanian
openaire   +1 more source

An efficient implementation of PBKDF2 with RIPEMD-160 on multiple FPGAs

2014 20th IEEE International Conference on Parallel and Distributed Systems (ICPADS), 2014
A weakness of many security systems is the strength of the chosen password or key derivation function. We show how FPGA technology can be used to effectively attack cryptographic applications with a password dictionary. We have implemented two independent PBKDF2 cores each using four HMAC cores with pipelines calculating a RIPEMD-160 hash to derive ...
Ayman Abbas   +3 more
openaire   +1 more source

On the high-throughput implementation of RIPEMD-160 hash algorithm

2008 International Conference on Application-Specific Systems, Architectures and Processors, 2008
In this paper we present two new architectures of the RIPEMD-160 hash algorithm for high throughput implementations. The first architecture achieves the iteration bound of RIPEMD-160, i.e. it achieves a theoretical upper bound on throughput at the micro-architecture level.
M. Knezzevic   +3 more
openaire   +1 more source

Application of novel technique in RIPEMD-160 aiming at high-throughput

2008 IEEE International Symposium on Industrial Electronics, 2008
Hash functions, form a special family of cryptographic algorithms that satisfy current requirements for security, confidentiality and validity for several applications in technology. Many applications like PKI, IPSec, DSA, MACpsilas need the requirements mentioned before. All the previous applications incorporate hash functions and address, as the time
Michail, Harris   +4 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy