Results 1 to 10 of about 22,218,864 (289)

Simulation Analysis and Comparison of New Hybrid TLI-µTESLA and Variant TESLA Protocols Using SHA-2 and SHA-3 Hash Functions [PDF]

open access: goldSensors, 2022
The evolution of 5G and 6G networks has enhanced the ability of massive IoT devices to provide real-time monitoring and interaction with the surrounding environment.
Khouloud Eledlebi   +5 more
doaj   +5 more sources

A High-Efficiency FPGA-Based Multimode SHA-2 Accelerator [PDF]

open access: goldIEEE Access, 2022
The secure hash algorithm 2 (SHA-2) family, including the SHA-224/256/384/512 hash functions, is widely adopted in many modern domains, ranging from Internet of Things devices to cryptocurrency.
Hoai Luan Pham   +3 more
doaj   +3 more sources

SHA-2 Acceleration Meeting the Needs of Emerging Applications: A Comparative Survey [PDF]

open access: goldIEEE Access, 2020
While SHA-2 is a ubiquitous cryptographic hashing primitive, its role in emerging application domains, e.g. blockchains or trusted IoT components, has made the acceleration of SHA-2 very challenging due to new stringent classes of requirements ...
Raffaele Martino, Alessandro Cilardo
doaj   +3 more sources

A Flexible Framework for Exploring, Evaluating, and Comparing SHA-2 Designs [PDF]

open access: goldIEEE Access, 2019
Hash functions are a crucial tool in a large variety of applications, ranging from security protocols to cryptocurrencies down to the Internet-of-Things devices used, for example, as biomedical appliances.
Raffaele Martino, Alessandro Cilardo
doaj   +3 more sources

Carry-based Differential Power Analysis (CDPA) and its Application to Attacking HMAC-SHA-2

open access: diamondTransactions on Cryptographic Hardware and Embedded Systems, 2023
In this paper, we introduce Carry-based Differential Power Analysis (CDPA), a novel methodology that allows for attacking schemes that use arithmetical addition. We apply this methodology to attacking HMAC-SHA-2. We provide full mathematical analysis of
Yaacov Belenky   +6 more
doaj   +4 more sources

Visualising Sha[2] in Abelian surfaces [PDF]

open access: bronze, 2004
Given an elliptic curve E1 over a number field and an element s in its 2-Selmer group, we give two different ways to construct infinitely many Abelian surfaces A such that the homogeneous space representing s occurs as a fibre of A over another elliptic ...
Nils Bruin
openalex   +5 more sources

Hardware authentication based on PUFs and SHA-3 2<sup>nd</sup> round candidates [PDF]

open access: green, 2010
Security features are getting a growing interest in microelectronics. Not only entities have to authenticate in the context of a high secure communication but also the hardware employed has to be trusted.
Susana Eiroa, Iluminada Baturone
openalex   +4 more sources

Time–space complexity of quantum search algorithms in symmetric cryptanalysis: applying to AES and SHA-2 [PDF]

open access: hybridQuantum Information Processing, 2018
Performance of cryptanalytic quantum search algorithms is mainly inferred from query complexity which hides overhead induced by an implementation. To shed light on quantitative complexity analysis removing hidden factors, we provide a framework for ...
Panjin Kim, Daewan Han, Kyung Chul Jeong
openalex   +3 more sources

Evaluating the efficacy of eggshell-derived hydroxyapatite (EHA) and synthetic hydroxyapatite (SHA) in bone regeneration of maxillofacial defects-a randomized double-blind pilot comparative clinical-radiological study [PDF]

open access: yesJournal of Oral Biology and Craniofacial Research
Background: Defects of the maxillofacial skeleton lead to functional, aesthetic, social, and behavioral problems, that make the person isolate from the mainstream of society. So, bone regeneration is needed for the overall health. Since long time various
Khushboo Changani   +6 more
doaj   +2 more sources

Estimating the Cost of Generic Quantum Pre-image Attacks on SHA-2 and SHA-3 [PDF]

open access: yesACM Symposium on Applied Computing, 2016
We investigate the cost of Grover’s quantum search algorithm when used in the context of pre-image attacks on the SHA-2 and SHA-3 families of hash functions.
M. Amy   +5 more
semanticscholar   +4 more sources

Home - About - Disclaimer - Privacy