Results 261 to 270 of about 142,210 (279)
Some of the next articles are maybe not open access.

Investigating the Utilization of the Secure Hash Algorithm to Generate Electromagnetic Noise

Proceedings of the 9th International Conference on Signal Processing Systems, 2017
This research introduces an electromagnetic (EM) noise generator known as the FRIES noise generator to mitigate and obfuscate Side Channel Analysis (SCA) attacks against a Raspberry Pi. The FRIES noise generator utilizes the implementation of the Secure Hash Algorithm (SHA) from OpenSSL to generate white noise within the EM spectrum.
Frieslaar, Ibraheem, Irwin, Barry V W
openaire   +3 more sources

Visualizing Secure Hash Algorithm (SHA-1) on the Web

2011
Cryptographic hash functions play an important role in modern cryptography. In this paper, we present web-based interactive visualization applets for teaching secure hash algorithm (SHA-1). The visualization applets lead to more efficient learning outcomes.
Dalia B. Nasr   +2 more
openaire   +2 more sources

Design and Implementation of Reconfigurable Security Hash Algorithms Based on FPGA

2009 WASE International Conference on Information Engineering, 2009
Today, security is a topic which attacks the greatinterest of researchers. Many encryption algorithms have beeninvestigated, and developed in the last years. Hash functionsare important security primitives used for authentication anddata integrity. The reconfigurable cryptographic chip is anintegrated circuit that is designed by means of the method ...
Xiaohui Yang   +3 more
openaire   +2 more sources

An efficient parallel algorithm for hash computation in security and forensics applications

2014 IEEE International Advance Computing Conference (IACC), 2014
Hashing algorithms are used extensively in information security and digital forensics applications. This paper presents an efficient parallel algorithm hash computation. It's a modification of the SHA-1 algorithm for faster parallel implementation in applications such as the digital signature and data preservation in digital forensics.
Neha Kishore, Bhanu Kapoor
openaire   +2 more sources

Hashing algorithms – a way to secure your application

2008
This article presents one of the mechanisms of ensuring security in applications designed in Java programming language – hashing algorithms. It describes selected elements of Java Cryptographic Architecture library. Chosen algorithms were scrutinized in terms of the security and how fast they work.
Ireneusz J. Jóźwiak   +2 more
openaire   +2 more sources

Deploying New Hash Algorithms in Secure Neighbor Discovery

2011
IP protocol version 6 (IPv6), a successor of IP protocol version 4 (IPv4), puts a significant effort in enhancing security facilities. Secure Neighbor Discovery (SEND) is an optional IPv6 protocol that counters threats in link-local communication allowed by Neighbor Discovery protocol (NDP).
Mikuc, Miljenko   +2 more
openaire   +1 more source

Signature based Merkle Hash Multiplication algorithm to secure the communication in IoT devices

Knowledge-Based Systems, 2022
S. Kumari   +3 more
semanticscholar   +1 more source

Generalized Secure Hash Algorithm: SHA-X

International Journal of Advancements in Computing Technology, 2012
Yi-Shiung Yeh   +3 more
openaire   +2 more sources

Nested chaotic image encryption scheme using two-diffusion process and the Secure Hash Algorithm SHA-1

International Conference on Control, Engineering & Information Technology, 2016
N. B. Slimane   +2 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy