Results 1 to 10 of about 32,401 (264)

A High-Efficiency FPGA-Based Multimode SHA-2 Accelerator [PDF]

open access: goldIEEE Access, 2022
The secure hash algorithm 2 (SHA-2) family, including the SHA-224/256/384/512 hash functions, is widely adopted in many modern domains, ranging from Internet of Things devices to cryptocurrency.
Hoai Luan Pham   +3 more
doaj   +4 more sources

Simulation Analysis and Comparison of New Hybrid TLI-µTESLA and Variant TESLA Protocols Using SHA-2 and SHA-3 Hash Functions [PDF]

open access: goldSensors, 2022
The evolution of 5G and 6G networks has enhanced the ability of massive IoT devices to provide real-time monitoring and interaction with the surrounding environment.
Khouloud Eledlebi   +5 more
doaj   +4 more sources

SHA-2 Acceleration Meeting the Needs of Emerging Applications: A Comparative Survey [PDF]

open access: goldIEEE Access, 2020
While SHA-2 is a ubiquitous cryptographic hashing primitive, its role in emerging application domains, e.g. blockchains or trusted IoT components, has made the acceleration of SHA-2 very challenging due to new stringent classes of requirements ...
Raffaele Martino, Alessandro Cilardo
doaj   +6 more sources

A Flexible Framework for Exploring, Evaluating, and Comparing SHA-2 Designs [PDF]

open access: goldIEEE Access, 2019
Hash functions are a crucial tool in a large variety of applications, ranging from security protocols to cryptocurrencies down to the Internet-of-Things devices used, for example, as biomedical appliances.
Raffaele Martino, Alessandro Cilardo
doaj   +5 more sources

Visualising Sha[2] in Abelian surfaces [PDF]

open access: bronzeMathematics of Computation, 2004
Given an elliptic curve E1 over a number field and an element s in its 2-Selmer group, we give two different ways to construct infinitely many Abelian surfaces A such that the homogeneous space representing s occurs as a fibre of A over another elliptic curve E2.
Nils Bruin
openalex   +3 more sources

Multi-mode operator for SHA-2 hash functions [PDF]

open access: bronzeJournal of Systems Architecture, 2006
We propose an improved implementation of the SHA-2 hash family, with minimal operator latency and reduced hardware requirements. We also propose a high frequency version at the cost of only two cycles of latency per message. Finally we present a multi-mode architecture able to perform either a SHA-384 or SHA-512 hash or to behave as two independent SHA-
Ryan Glabb   +4 more
  +7 more sources

Preimages for Step-Reduced SHA-2 [PDF]

open access: bronze, 2009
In this paper, we present preimage attacks on up to 43-step SHA-256 (around 67% of the total 64 steps) and 46-step SHA-512 (around 57.5% of the total 80 steps), which significantly increases the number of attacked steps compared to the best previously published preimage attack working for 24 steps.
Kazumaro Aoki   +4 more
openalex   +3 more sources

22-Step Collisions for SHA-2 [PDF]

open access: green, 2008
In this note, we provide the first 22-step collisions for SHA-256 and SHA-512. Detailed technique of generating these collisions will be provided in the next revision of this note.
Somitra Kumar Sanadhya, Palash Sarkar
openalex   +3 more sources

Faster bowel recovery with superior haemorrhoidal artery preservation in patients undergoing sigmoidectomy for diverticular disease: A retrospective cohort study from the diverticular disease registry trial [PDF]

open access: yesJournal of Minimal Access Surgery
Introduction: The pathogenesis of diverticular disease varies significantly and so does its clinical presentation. The procedure for left-sided diverticular disease is standardised, but there is still no consensus on the level of arterial ligation.
Jacopo Crippa   +16 more
doaj   +2 more sources

Carry-based Differential Power Analysis (CDPA) and its Application to Attacking HMAC-SHA-2

open access: diamondTransactions on Cryptographic Hardware and Embedded Systems, 2023
In this paper, we introduce Carry-based Differential Power Analysis (CDPA), a novel methodology that allows for attacking schemes that use arithmetical addition. We apply this methodology to attacking HMAC-SHA-2. We provide full mathematical analysis of
Yaacov Belenky   +6 more
doaj   +3 more sources

Home - About - Disclaimer - Privacy