Results 241 to 250 of about 147,726 (298)
Some of the next articles are maybe not open access.

OSHA: A General-purpose and Next Generation One-way Secure Hash Algorithm

International Conference on Interaction Sciences, 2022
Secure hash functions are widely used in cryptographic algorithms to secure against diverse attacks. A one-way secure hash function is used in the various research fields to secure, for instance, blockchain.
Ripon Patgiri
semanticscholar   +1 more source

Design and Analysis of Hash Algorithm Using Autonomous Initial Value Proposed Secure Hash Algorithm64

IEEE India Conference, 2021
A secure hash code or message authentication code is a one-way hash algorithm. It is producing a fixed-size hash function to be used to check verification, the integrity of electronic data, password storage.
B. Ambedkar, P. Bharti, Akhtar Husain
semanticscholar   +1 more source

Acceleration of the Secure Hash Algorithm-256 (SHA-256) on an FPGA-CPU Cluster Using OpenCL

International Symposium on Circuits and Systems, 2021
The Secure Hash Algorithm-256 (SHA-256) is a cryptographic function used in a wide variety of applications ranging from Internet of Things micro-devices to highperformance systems.
Hachem Bensalem   +2 more
semanticscholar   +1 more source

Enhance Neighbor Discovery Protocol Security by Using Secure Hash Algorithm

International Conference on Intelligent Computing, 2021
Neighbor Discovery Protocol (NDP) plays a vital role in IPv6. Neighbor Solicitation (NS) and Neighbor Advertisement (NA) are two important messages of NDP.
Muhammad Usman   +5 more
semanticscholar   +1 more source

Brief review on journey of secured hash algorithms [PDF]

open access: possible2017 4th International Conference on Opto-Electronics and Applied Optics (Optronix), 2017
A detailed review of a brief history, applications and contributions of the hash functions in today's cryptology are articulated here. The secured hash functions are applied in various fields to provide a secure data transfer and authentication of messages and other user linked information through a series of algorithms.
Santanu Debnath   +2 more
openaire   +1 more source

EVOLUTION AND ANALYSIS OF SECURED HASH ALGORITHM (SHA) FAMILY

Malaysian Journal of Computer Science, 2022
With the rapid advancement of technologies and proliferation of intelligent devices, connecting to the internet challenges have grown manifold, such as ensuring communication security and keeping user credentials secret. Data integrity and user privacy have become crucial concerns in any ecosystem of advanced and interconnected communications ...
Khan, Burhan Ul Islam   +5 more
openaire   +2 more sources

Secure OFDM communications based on hashing algorithms

SPIE Proceedings, 2007
In this paper we propose an OFDM (Orthogonal Frequency Division Multiplexing) wireless communication system that introduces mutual authentication and encryption at the physical layer, without impairing spectral efficiency, exploiting some freedom degrees of the base-band signal, and using encrypted-hash algorithms.
NERI, Alessandro   +2 more
openaire   +2 more sources

Security and Robustness Enhancement of Existing Hash Algorithm

2009 International Conference on Signal Processing Systems, 2009
In wireless communication for data integrity hash functions are commonly used. It is also an important cryptographic primitives, which is very critical for data integrity assurance and data origin authentication in security services. SHA hash functions are set of cryptographic hash function designed by NSA.
Thulasmani Lakshmanan, M. Madheswaran
openaire   +2 more sources

Generalized secure hash algorithm: SHA-X

2011 IEEE EUROCON - International Conference on Computer as a Tool, 2011
This paper defines a generalized SHA algorithm based on the SHA family rules. The proposed algorithm accepts arbitrary length message as input to generate message digest with the required length. It contains the initial values, constant values, padding, parsing, as well as the generalized main body.
Yi-Shiung Yeh   +4 more
openaire   +2 more sources

Implement Time Based One Time Password and Secure Hash Algorithm 1 for Security of Website Login Authentication

2019 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS), 2019
The use of information systems is a solutions to support the operations of the institution. In order to access information systems in accordance with their access rights, usually the user will enter a username and password as the authentication process ...
H. Seta   +2 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy