Results 11 to 20 of about 153,790 (328)

Secure Hash Algorithm-2 formed on DNA [PDF]

open access: yesJournal of the Egyptian Mathematical Society, 2019
Abstract We present a new version of the Secure Hash Algorithm-2 (SHA-2) formed on artificial sequences of deoxyribonucleic acid (DNA). This article is the first attempt to present the implementation of SHA-2 using DNA data processing. We called the new version DNSHA-2. We present new operations on an artificial DNA sequence, such as (1) $
Dieaa I. Nassr
openaire   +3 more sources

Multi-Core Dataflow Design and Implementation of Secure Hash Algorithm-3

open access: yesIEEE Access, 2018
Embedded multi-core systems are implemented as systems-on-chip that rely on packet storeand-forward networks-on-chip for communications. These systems do not use buses or global clock.
Ali Alzahrani, Fayez Gebali
doaj   +2 more sources

An Improved Fast and Secure Hash Algorithm

open access: yesJournal of Information Processing Systems, 2012
Abstract —Recently, a fast and secure hash function SFHA – 256 has been proposed and claimed as more secure and as having a better performance than the SHA – 256. In this paper an improved version of SFHA – 256 is proposed and analyzed using two parameters, namely the avalanche effect and uniform deviation. The experimental results and further analysis
Siddharth Agarwal   +4 more
openaire   +3 more sources

Design and Implementation of a Strong and Secure Lightweight Cryptographic Hash Algorithm using Elliptic Curve Concept: SSLHA-160 [PDF]

open access: diamond, 2021
Cryptographic hash function assumes a fundamental job in numerous pieces of cryptographic algorithm and conventions, particularly in authentication, non-repudiation and information trustworthiness administrations.
Bhaskar Prakash Kosta, Pasala Sanyasi
openalex   +2 more sources

A New Image Encryption Algorithm Based on Chaos and Secure Hash SHA-256

open access: yesEntropy, 2018
In order to overcome the difficulty of key management in “one time pad” encryption schemes and also resist the attack of chosen plaintext, a new image encryption algorithm based on chaos and SHA-256 is proposed in this paper. The architecture
Shuqin Zhu, Congxu Zhu, Wenhong Wang
doaj   +2 more sources

Secure Hash Algorithm-3(SHA-3) implementation on Xilinx FPGAs, Suitable for IoT Applications [PDF]

open access: diamondInternational Journal on Smart Sensing and Intelligent Systems, 2014
Data integrity is a term used when referring to the accuracy and reliability of data. It ensures that data is not altered during operations, such as transfer, storage, or retrieval.
Muzaffar Rao, Thomas Newe, Ian Grout
openalex   +2 more sources

High-performance FPGA implementation of the secure hash algorithm 3 for single and multi-message processing

open access: diamondInternational Journal of Electrical and Computer Engineering (IJECE), 2022
The secure hash function has become the default choice for information security, especially in applications that require data storing or manipulation. Consequently, optimized implementations of these functions in terms of Throughput or Area are in high ...
Fatimazahraa Assad   +3 more
openalex   +3 more sources

CASH: A Cost Asymmetric Secure Hash Algorithm for Optimal Password Protection [PDF]

open access: greenIEEE Computer Security Foundations Symposium, 2015
An adversary who has obtained the cryptographic hash of a user's password can mount an offline attack to crack the password by comparing this hash value with the cryptographic hashes of likely password guesses.
Jeremiah Blocki, Anupam Datta
semanticscholar   +4 more sources

HW/SW Architecture Exploration for an Efficient Implementation of the Secure Hash Algorithm SHA-256

open access: yesJournal of Communications Software and Systems, 2021
—Hash functions are used in the majority of security protocol to guarantee the integrity and the authenticity. Among the most important hash functions is the SHA-2 family, which offers higher security and solved the insecurity problems of other popular ...
Manel Kammoun   +3 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy