Results 1 to 10 of about 456,903 (262)

Secure Hash Algorithm-2 formed on DNA [PDF]

open access: diamondJournal of the Egyptian Mathematical Society, 2019
We present a new version of the Secure Hash Algorithm-2 (SHA-2) formed on artificial sequences of deoxyribonucleic acid (DNA). This article is the first attempt to present the implementation of SHA-2 using DNA data processing.
Dieaa I. Nassr
doaj   +5 more sources

Performance and Limitation Review of Secure Hash Function Algorithm [PDF]

open access: bronzeInternational Journal on Recent and Innovation Trends in Computing and Communication, 2019
A cryptographic hash work is a phenomenal class of hash work that has certain properties which make it fitting for use in cryptography. It is a numerical figuring that maps information of emotional size to a bit string of a settled size (a hash) and is ...
Chetty, Tejasvini, Malviya, Iti
core   +4 more sources

Multi-Core Dataflow Design and Implementation of Secure Hash Algorithm-3

open access: goldIEEE Access, 2018
Embedded multi-core systems are implemented as systems-on-chip that rely on packet storeand-forward networks-on-chip for communications. These systems do not use buses or global clock.
Ali Alzahrani, Fayez Gebali
doaj   +3 more sources

A New Image Encryption Algorithm Based on Chaos and Secure Hash SHA-256 [PDF]

open access: goldEntropy, 2018
In order to overcome the difficulty of key management in “one time pad” encryption schemes and also resist the attack of chosen plaintext, a new image encryption algorithm based on chaos and SHA-256 is proposed in this paper. The architecture
Shuqin Zhu, Congxu Zhu, Wenhong Wang
doaj   +3 more sources

HW/SW Architecture Exploration for an Efficient Implementation of the Secure Hash Algorithm SHA-256 [PDF]

open access: diamondJournal of Communications Software and Systems, 2021
—Hash functions are used in the majority of security protocol to guarantee the integrity and the authenticity. Among the most important hash functions is the SHA-2 family, which offers higher security and solved the insecurity problems of other popular ...
Manel Kammoun   +3 more
openalex   +2 more sources

Count based Secured Hash Algorithm [PDF]

open access: bronzeIOSR Journal of Computer Engineering, 2012
This paper introduces a new approach to the Secured hash algorithm. The proposed algorithms takes the variable length input bit sequence and generate the fix length output as according to the algorithm. There are many constant values, used functions, pre-processing and hashing in SHA(1)(2)(3)(4). Here introducing new technique in which shifting of bits
Mayank Swarnkar
openalex   +2 more sources

US Secure Hash Algorithm 1 (SHA1) [PDF]

open access: bronzeRequest for Comments, 2001
The purpose of this document is to make the SHA-1 (Secure Hash Algorithm 1) hash algorithm conveniently available to the Internet community. The United States of America has adopted the SHA-1 hash algorithm described herein as a Federal Information ...
D. Eastlake, Paul B. Jones
openalex   +2 more sources

OSHA: A General-purpose and Next Generation One-way Secure Hash Algorithm [PDF]

open access: yesInternational Conference on Interaction Sciences, 2022
Secure hash functions are widely used in cryptographic algorithms to secure against diverse attacks. A one-way secure hash function is used in the various research fields to secure, for instance, blockchain.
Ripon Patgiri
core   +2 more sources

Penerapan Algoritma Secure Hash Algorithm (SHA) Keamanan Pada Citra [PDF]

open access: hybridMEANS (Media Informasi Analisa dan Sistem), 2019
Current information exchange is not only in the form of text, it can be an image or video. All of that can be done using computer network technology in the form of the internet.
Hermansyah Sembiring   +2 more
openalex   +2 more sources

Home - About - Disclaimer - Privacy