Results 1 to 10 of about 21,562,350 (226)

Time-Space Complexity of Quantum Search Algorithms in Symmetric Cryptanalysis [PDF]

open access: hybridQuantum Inf Process (2018) 17: 339, 2018
Performance of cryptanalytic quantum search algorithms is mainly inferred from query complexity which hides overhead induced by an implementation. To shed light on quantitative complexity analysis removing hidden factors, we provide a framework for estimating time-space complexity, with carefully accounting for characteristics of target cryptographic ...
Panjin Kim, Daewan Han, Kyung Chul Jeong
arxiv   +5 more sources

A High-Efficiency FPGA-Based Multimode SHA-2 Accelerator [PDF]

open access: goldIEEE Access, 2022
The secure hash algorithm 2 (SHA-2) family, including the SHA-224/256/384/512 hash functions, is widely adopted in many modern domains, ranging from Internet of Things devices to cryptocurrency.
Hoai Luan Pham   +3 more
semanticscholar   +4 more sources

A Flexible Framework for Exploring, Evaluating, and Comparing SHA-2 Designs [PDF]

open access: goldIEEE Access, 2019
Hash functions are a crucial tool in a large variety of applications, ranging from security protocols to cryptocurrencies down to the Internet-of-Things devices used, for example, as biomedical appliances.
Raffaele Martino, Alessandro Cilardo
semanticscholar   +4 more sources

Carry-based Differential Power Analysis (CDPA) and its Application to Attacking HMAC-SHA-2

open access: diamondTransactions on Cryptographic Hardware and Embedded Systems, 2023
In this paper, we introduce Carry-based Differential Power Analysis (CDPA), a novel methodology that allows for attacking schemes that use arithmetical addition. We apply this methodology to attacking HMAC-SHA-2.
Yaacov Belenky   +6 more
semanticscholar   +5 more sources

SHA-2 Acceleration Meeting the Needs of Emerging Applications: A Comparative Survey [PDF]

open access: goldIEEE Access, 2020
While SHA-2 is a ubiquitous cryptographic hashing primitive, its role in emerging application domains, e.g. blockchains or trusted IoT components, has made the acceleration of SHA-2 very challenging due to new stringent classes of requirements ...
Raffaele Martino, Alessandro Cilardo
semanticscholar   +4 more sources

22-Step Collisions for SHA-2 [PDF]

open access: greenarXiv, 2008
In this note, we provide the first 22-step collisions for SHA-256 and SHA-512. Detailed technique of generating these collisions will be provided in the next revision of this note.
Somitra Kumar Sanadhya, Palash Sarkar
arxiv   +3 more sources

Estimating the cost of generic quantum pre-image attacks on SHA-2 and SHA-3 [PDF]

open access: greenarXiv, 2016
We investigate the cost of Grover's quantum search algorithm when used in the context of pre-image attacks on the SHA-2 and SHA-3 families of hash functions. Our cost model assumes that the attack is run on a surface code based fault-tolerant quantum computer.
Matthew Amy   +5 more
arxiv   +3 more sources

Performance Analysis of Sha-2 and Sha-3 Finalists [PDF]

open access: green, 2013
SHA ...
Ram Krishna Dahal   +2 more
semanticscholar   +3 more sources

Estimating the Cost of Generic Quantum Pre-image Attacks on SHA-2 and SHA-3 [PDF]

open access: greenACM Symposium on Applied Computing, 2017
We investigate the cost of Grover’s quantum search algorithm when used in the context of pre-image attacks on the SHA-2 and SHA-3 families of hash functions.
Matthew Amy   +5 more
openalex   +2 more sources

Low Power Implementation of Secure Hashing Algorithm (SHA-2) using VHDL on FPGA of SHA-256

open access: bronzeInternational Journal for Research in Applied Science and Engineering Technology, 2018
Due to the rapid developments in the wireless communications area and personal communications systems, providing information security has become a more and more important subject.
Ms. Dipti Thakur
openalex   +2 more sources

Home - About - Disclaimer - Privacy