Results 261 to 270 of about 46,179 (288)
Some of the next articles are maybe not open access.

Exploiting Coding Theory for Collision Attacks on SHA-1

2005
In this article we show that coding theory can be exploited efficiently for the cryptanalysis of hash functions. We will mainly focus on SHA-1. We present different linear codes that are used to find low-weight differences that lead to a collision. We extend existing approaches and include recent results in the cryptanalysis of hash functions. With our
Norbert Pramstaller   +2 more
openaire   +1 more source

Hardware Architecture and Cost Estimates for Breaking SHA-1

2005
The cryptanalysis of hash functions has advanced rapidly, and many hash functions have been broken one after another. The most popular hash function SHA-1 has not been broken yet, but the new collision search techniques proposed by Wang et al. reduced the computational complexity down to 269, which is only 1/2,000 of the 280 operations needed for a ...
openaire   +1 more source

Visually asymmetric image encryption algorithm based on SHA-3 and compressive sensing by embedding encrypted image

AEJ - Alexandria Engineering Journal, 2022
Hong-yang Zhu   +2 more
exaly  

A High-Efficiency FPGA-Based Multimode SHA-2 Accelerator

IEEE Access, 2022
Pham Hoai Luan   +2 more
exaly  

Breaking SHA-1 through QUBO models

2024 Twelfth International Symposium on Computing and Networking Workshops (CANDARW)
Shunsuke Tsukiyama   +4 more
openaire   +1 more source

A High-Performance Multimem SHA-256 Accelerator for Society 5.0

IEEE Access, 2021
Thi Hong Tran   +2 more
exaly  

Home - About - Disclaimer - Privacy