Results 271 to 279 of about 142,210 (279)
Some of the next articles are maybe not open access.

An efficient fault detection scheme for the secure hash algorithm SHA-512

2017 International Conference on Green Energy Conversion Systems (GECS), 2017
Fatma Kahri   +3 more
semanticscholar   +1 more source

Technological solutions for throughput improvement of a Secure Hash Algorithm-256 engine

International Symposium for Design and Technology in Electronic Packaging, 2017
Flavius Opritoiu   +2 more
semanticscholar   +1 more source

Secure hash algorithms

With the significance of data security increasing, hashing has become a vital part of both the computer sciences and mathematical research. Even though the first secure hashing algorithm has been defined by NIST decades ago, research on the field of secure hashing algorithms is now more relevant than ever. However, the choice of which security level to
openaire   +1 more source

A compact FPGA-based processor for the Secure Hash Algorithm SHA-256

Computers & electrical engineering, 2014
Rommel GarcĂ­a   +4 more
semanticscholar   +1 more source

Efficient High Speed Implementation of Secure Hash Algorithm-3 on Virtex-5 FPGA

2014 17th Euromicro Conference on Digital System Design, 2014
M. Rao, T. Newe, I. Grout
semanticscholar   +1 more source

FPGA-based implementation alternatives for the inner loop of the Secure Hash Algorithm SHA-256

Microprocessors and microsystems, 2013
I. Algredo-Badillo   +3 more
semanticscholar   +1 more source

A fault attack on a hardware-based implementation of the secure hash algorithm SHA-512

International Conference on Reconfigurable Computing and FPGAs, 2013
Abdulhadi Shoufan
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy