Results 1 to 10 of about 29,953 (270)

A Flexible Framework for Exploring, Evaluating, and Comparing SHA-2 Designs [PDF]

open access: goldIEEE Access, 2019
Hash functions are a crucial tool in a large variety of applications, ranging from security protocols to cryptocurrencies down to the Internet-of-Things devices used, for example, as biomedical appliances.
Raffaele Martino, Alessandro Cilardo
doaj   +6 more sources

A High-Efficiency FPGA-Based Multimode SHA-2 Accelerator [PDF]

open access: goldIEEE Access, 2022
The secure hash algorithm 2 (SHA-2) family, including the SHA-224/256/384/512 hash functions, is widely adopted in many modern domains, ranging from Internet of Things devices to cryptocurrency.
Hoai Luan Pham   +3 more
doaj   +4 more sources

Simulation Analysis and Comparison of New Hybrid TLI-µTESLA and Variant TESLA Protocols Using SHA-2 and SHA-3 Hash Functions [PDF]

open access: goldSensors, 2022
The evolution of 5G and 6G networks has enhanced the ability of massive IoT devices to provide real-time monitoring and interaction with the surrounding environment.
Khouloud Eledlebi   +5 more
doaj   +4 more sources

SHA-2 Acceleration Meeting the Needs of Emerging Applications: A Comparative Survey [PDF]

open access: goldIEEE Access, 2020
While SHA-2 is a ubiquitous cryptographic hashing primitive, its role in emerging application domains, e.g. blockchains or trusted IoT components, has made the acceleration of SHA-2 very challenging due to new stringent classes of requirements ...
Raffaele Martino, Alessandro Cilardo
doaj   +6 more sources

Performance Analysis of Sha-2 and Sha-3 Finalists [PDF]

open access: greenInternational Journal on Cryptography and Information Security, 2013
National Institute of Science and Technology (NIST) published the first Secure Hash Standard SHA-0 in 1993 as Federal Information Processing Standard publication (FIPS PUBS) which two years later was replaced by SHA-1 to improve the original design and added SHA-2 family by subsequent revisions of the FIPS.
Ram Krishna Dahal   +2 more
  +6 more sources

Improving SHA-2 Hardware Implementations [PDF]

open access: bronze, 2006
This paper proposes a set of new techniques to improve the implementation of the SHA-2 hashing algorithm. These techniques consist mostly in operation rescheduling and hardware reutilization, allowing a significant reduction of the critical path while the required area also decreases.
Ricardo Chaves   +3 more
openalex   +3 more sources

Visualising Sha[2] in Abelian surfaces [PDF]

open access: bronzeMathematics of Computation, 2004
Given an elliptic curve E1 over a number field and an element s in its 2-Selmer group, we give two different ways to construct infinitely many Abelian surfaces A such that the homogeneous space representing s occurs as a fibre of A over another elliptic curve E2.
Nils Bruin
openalex   +5 more sources

Preimages for Step-Reduced SHA-2 [PDF]

open access: bronze, 2009
In this paper, we present preimage attacks on up to 43-step SHA-256 (around 67% of the total 64 steps) and 46-step SHA-512 (around 57.5% of the total 80 steps), which significantly increases the number of attacked steps compared to the best previously published preimage attack working for 24 steps.
Kazumaro Aoki   +4 more
openalex   +3 more sources

Multi-mode operator for SHA-2 hash functions [PDF]

open access: greenJournal of Systems Architecture, 2006
We propose an improved implementation of the SHA-2 hash family, with minimal operator latency and reduced hardware requirements. We also propose a high frequency version at the cost of only two cycles of latency per message. Finally we present a multi-mode architecture able to perform either a SHA-384 or SHA-512 hash or to behave as two independent SHA-
Ryan Glabb   +4 more
openalex   +4 more sources

22-Step Collisions for SHA-2

open access: green, 2008
In this note, we provide the first 22-step collisions for SHA-256 and SHA-512. Detailed technique of generating these collisions will be provided in the next revision of this note.
Somitra Kumar Sanadhya, Palash Sarkar
openalex   +4 more sources

Home - About - Disclaimer - Privacy