Results 1 to 10 of about 146,932 (311)

Multi-Core Dataflow Design and Implementation of Secure Hash Algorithm-3

open access: goldIEEE Access, 2018
Embedded multi-core systems are implemented as systems-on-chip that rely on packet storeand-forward networks-on-chip for communications. These systems do not use buses or global clock.
Ali Alzahrani, Fayez Gebali
doaj   +3 more sources

A New Image Encryption Algorithm Based on Chaos and Secure Hash SHA-256 [PDF]

open access: goldEntropy, 2018
In order to overcome the difficulty of key management in “one time pad” encryption schemes and also resist the attack of chosen plaintext, a new image encryption algorithm based on chaos and SHA-256 is proposed in this paper. The architecture
Shuqin Zhu, Congxu Zhu, Wenhong Wang
doaj   +3 more sources

HW/SW Architecture Exploration for an Efficient Implementation of the Secure Hash Algorithm SHA-256 [PDF]

open access: diamondJournal of Communications Software and Systems, 2021
—Hash functions are used in the majority of security protocol to guarantee the integrity and the authenticity. Among the most important hash functions is the SHA-2 family, which offers higher security and solved the insecurity problems of other popular ...
Manel Kammoun   +3 more
openalex   +2 more sources

Count based Secured Hash Algorithm [PDF]

open access: bronzeIOSR Journal of Computer Engineering, 2012
This paper introduces a new approach to the Secured hash algorithm. The proposed algorithms takes the variable length input bit sequence and generate the fix length output as according to the algorithm. There are many constant values, used functions, pre-processing and hashing in SHA(1)(2)(3)(4). Here introducing new technique in which shifting of bits
Mayank Swarnkar
openalex   +2 more sources

A Secure Perceptual Hash Algorithm for Image Content Authentication [PDF]

open access: bronze, 2011
Perceptual hashing is a promising solution to image content authentication. However, conventional image hash algorithms only offer a limited authentication level for the protection of overall content. In this work, we propose an image hash algorithm with block level content protection.
Li Weng, Bart Preneel
openalex   +4 more sources

High-performance FPGA implementation of the secure hash algorithm 3 for single and multi-message processing

open access: goldInternational Journal of Electrical and Computer Engineering (IJECE), 2022
The secure hash function has become the default choice for information security, especially in applications that require data storing or manipulation. Consequently, optimized implementations of these functions in terms of Throughput or Area are in high ...
Fatimazahraa Assad   +3 more
openalex   +3 more sources

Enhancing confidentiality and access control in electronic health record systems using a hybrid hashing blockchain framework [PDF]

open access: yesScientific Reports
Confidentiality and access control are essential to protect sensitive data, prevent cyber threats, ensure compliance, and avoid risks like identity theft.
D. Gowtham Chakravarthy   +3 more
doaj   +2 more sources

Penerapan Algoritma Secure Hash Algorithm (SHA) Keamanan Pada Citra [PDF]

open access: hybridMEANS (Media Informasi Analisa dan Sistem), 2019
Current information exchange is not only in the form of text, it can be an image or video. All of that can be done using computer network technology in the form of the internet.
Hermansyah Sembiring   +2 more
openalex   +2 more sources

An Improved Fast and Secure Hash Algorithm [PDF]

open access: yesJournal of Information Processing Systems, 2012
Abstract —Recently, a fast and secure hash function SFHA – 256 has been proposed and claimed as more secure and as having a better performance than the SHA – 256. In this paper an improved version of SFHA – 256 is proposed and analyzed using two parameters, namely the avalanche effect and uniform deviation. The experimental results and further analysis
Abhinav Rungta   +4 more
openaire   +3 more sources

On Information Integrity Measurement with Secure Hash Algorithm (SHA) [PDF]

open access: bronzeInSITE Conference, 2015
The “information age” as often referred to the modern society, has become heavily dependent on information systems. As this dependency increases, the threat to information security has also gained ground. Societies need to cater for the security of information, and this has led to the development of different information security techniques most ...
Segun Adebisi Ojo   +3 more
openalex   +3 more sources

Home - About - Disclaimer - Privacy