Results 1 to 10 of about 22,180,114 (189)

A High-Efficiency FPGA-Based Multimode SHA-2 Accelerator [PDF]

open access: goldIEEE Access, 2022
The secure hash algorithm 2 (SHA-2) family, including the SHA-224/256/384/512 hash functions, is widely adopted in many modern domains, ranging from Internet of Things devices to cryptocurrency.
Hoai Luan Pham   +3 more
doaj   +5 more sources

Simulation Analysis and Comparison of New Hybrid TLI-µTESLA and Variant TESLA Protocols Using SHA-2 and SHA-3 Hash Functions [PDF]

open access: goldSensors, 2022
The evolution of 5G and 6G networks has enhanced the ability of massive IoT devices to provide real-time monitoring and interaction with the surrounding environment.
Khouloud Eledlebi   +5 more
doaj   +5 more sources

SHA-2 Acceleration Meeting the Needs of Emerging Applications: A Comparative Survey [PDF]

open access: goldIEEE Access, 2020
While SHA-2 is a ubiquitous cryptographic hashing primitive, its role in emerging application domains, e.g. blockchains or trusted IoT components, has made the acceleration of SHA-2 very challenging due to new stringent classes of requirements ...
Raffaele Martino, Alessandro Cilardo
doaj   +7 more sources

A Flexible Framework for Exploring, Evaluating, and Comparing SHA-2 Designs [PDF]

open access: goldIEEE Access, 2019
Hash functions are a crucial tool in a large variety of applications, ranging from security protocols to cryptocurrencies down to the Internet-of-Things devices used, for example, as biomedical appliances.
Raffaele Martino, Alessandro Cilardo
doaj   +6 more sources

Carry-based Differential Power Analysis (CDPA) and its Application to Attacking HMAC-SHA-2

open access: diamondTransactions on Cryptographic Hardware and Embedded Systems, 2023
In this paper, we introduce Carry-based Differential Power Analysis (CDPA), a novel methodology that allows for attacking schemes that use arithmetical addition. We apply this methodology to attacking HMAC-SHA-2. We provide full mathematical analysis of
Yaacov Belenky   +6 more
doaj   +4 more sources

Efficient FPGA Hardware Implementation of Secure Hash Function SHA-2 [PDF]

open access: bronzeInternational Journal of Computer Network and Information Security, 2014
The Hash function has been studied by designers with the goal to improve its performances in terms of area, frequency and throughput. The Hash function is used in many embedded systems to provide security. It is become the default choice for security services in numerous applications.
Hassen Mestiri   +3 more
semanticscholar   +4 more sources

Routing Using Trust Based System with SHA-2 Authentication

open access: diamondProcedia Computer Science, 2015
AbstractMobile Ad hoc NETwork (MANET) is an infrastructure independent network with every mobile node acting as the router in the network formation. These networks are most useful when the present infrastructure is destroyed or at remote locations which are deprived of these amenities.
Ravilla Dilli   +1 more
semanticscholar   +3 more sources

Performance Analysis of Sha-2 and Sha-3 Finalists

open access: greenInternational Journal on Cryptography and Information Security, 2013
National Institute of Science and Technology (NIST) published the first Secure Hash Standard SHA-0 in 1993 as Federal Information Processing Standard publication (FIPS PUBS) which two years later was replaced by SHA-1 to improve the original design and added SHA-2 family by subsequent revisions of the FIPS.
Jagdish Bhatta Ram Krishna Dahal
semanticscholar   +4 more sources

Design SHA-2 MIPS Processor Using FPGA [PDF]

open access: diamondCihan University-Erbil Scientific Journal, 2017
Safaa S. Omran, Laith F. Jumma
semanticscholar   +3 more sources

Performance analysis of SHA 2 and SHA 3

open access: greenSSRN Electronic Journal, 2022
Swati Sharma, Loveneet, Saba Khanum
semanticscholar   +3 more sources

Home - About - Disclaimer - Privacy