Results 261 to 270 of about 46,179 (288)
Some of the next articles are maybe not open access.
Exploiting Coding Theory for Collision Attacks on SHA-1
2005In this article we show that coding theory can be exploited efficiently for the cryptanalysis of hash functions. We will mainly focus on SHA-1. We present different linear codes that are used to find low-weight differences that lead to a collision. We extend existing approaches and include recent results in the cryptanalysis of hash functions. With our
Norbert Pramstaller +2 more
openaire +1 more source
Hardware Architecture and Cost Estimates for Breaking SHA-1
2005The cryptanalysis of hash functions has advanced rapidly, and many hash functions have been broken one after another. The most popular hash function SHA-1 has not been broken yet, but the new collision search techniques proposed by Wang et al. reduced the computational complexity down to 269, which is only 1/2,000 of the 280 operations needed for a ...
openaire +1 more source
An asymmetric image encryption scheme based on hash SHA-3, RSA and compressive sensing
Optik, 2022Guo-dong Ye
exaly
A High-Efficiency FPGA-Based Multimode SHA-2 Accelerator
IEEE Access, 2022Pham Hoai Luan +2 more
exaly
Breaking SHA-1 through QUBO models
2024 Twelfth International Symposium on Computing and Networking Workshops (CANDARW)Shunsuke Tsukiyama +4 more
openaire +1 more source
A High-Performance Multimem SHA-256 Accelerator for Society 5.0
IEEE Access, 2021Thi Hong Tran +2 more
exaly

