Results 1 to 10 of about 36,417 (288)

Study Security Cloud with SHA-2 Algorithm

open access: gold, 2023
This study explores the relationship between cloud computing and security, concentrating on the use of the SHA-2 cryptographic algorithm. Due to the distributed and shared nature of cloud settings, cloud computing has transformed how information and services are accessed and provided. However, it has also created new security issues.
Arnes Yuli Vandika
openaire   +4 more sources

Performance Analysis of Sha-2 and Sha-3 Finalists

open access: greenInternational Journal on Cryptography and Information Security, 2013
National Institute of Science and Technology (NIST) published the first Secure Hash Standard SHA-0 in 1993 as Federal Information Processing Standard publication (FIPS PUBS) which two years later was replaced by SHA-1 to improve the original design and added SHA-2 family by subsequent revisions of the FIPS.
Ram Krishna Dahal   +2 more
  +4 more sources

Routing Using Trust Based System with SHA-2 Authentication

open access: diamondProcedia Computer Science, 2015
AbstractMobile Ad hoc NETwork (MANET) is an infrastructure independent network with every mobile node acting as the router in the network formation. These networks are most useful when the present infrastructure is destroyed or at remote locations which are deprived of these amenities.
Ravilla, Dilli   +1 more
openaire   +2 more sources

Cryptanalysis of Dynamic SHA(2) [PDF]

open access: green, 2009
In this paper, we analyze the hash functions Dynamic SHA and Dynamic SHA2, which have been selected as first round candidates in the NIST hash function competition. These hash functions rely heavily on data-dependent rotations, similar to certain block ciphers, e.g., RC5.
Aumasson, Jean-Philippe   +3 more
openaire   +3 more sources

Efficient FPGA Hardware Implementation of Secure Hash Function SHA-2 [PDF]

open access: bronzeInternational Journal of Computer Network and Information Security, 2014
The Hash function has been studied by designers with the goal to improve its performances in terms of area, frequency and throughput. The Hash function is used in many embedded systems to provide security. It is become the default choice for security services in numerous applications.
Hassen Mestiri   +3 more
openaire   +3 more sources

Performance analysis of SHA 2 and SHA 3

open access: greenSSRN Electronic Journal, 2022
Swati Sharma, Loveneet ., Saba Khanum
openaire   +2 more sources

Design SHA-2 MIPS Processor Using FPGA [PDF]

open access: diamondCihan University-Erbil Scientific Journal, 2017
Laith Fouad, Safaa Omran
openaire   +2 more sources

Design, Synthesis and Characterization of [G10a]-Temporin SHa Dendrimers as Dual Inhibitors of Cancer and Pathogenic Microbes

open access: yesBiomolecules, 2022
As the technologies for peptide synthesis and development continue to mature, antimicrobial peptides (AMPs) are being widely studied as significant contributors in medicinal chemistry research. Furthermore, the advancement in the synthesis of dendrimers’
Arif Iftikhar Khan   +9 more
doaj   +1 more source

Applying Grover's Algorithm to Hash Functions: A Software Perspective

open access: yesIEEE Transactions on Quantum Engineering, 2022
Quantum software frameworks provide software engineers with the tools to study quantum algorithms as applied to practical problems. We implement classical hash functions MD5, SHA-1, SHA-2, and SHA-3 as quantum oracles to study the computational resource ...
Richard H. Preston
doaj   +1 more source

Enhanced immunogenicity of stabilized trimeric soluble influenza hemagglutinin. [PDF]

open access: yesPLoS ONE, 2010
The recent swine-origin H1N1 pandemic illustrates the need to develop improved procedures for rapid production of influenza vaccines. One alternative to the current egg-based manufacture of influenza vaccine is to produce a hemagglutinin (HA) subunit ...
William C Weldon   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy