Results 11 to 20 of about 689 (221)

Exhibiting SHA[2] on hyperelliptic Jacobians

open access: bronzeJournal of Number Theory, 2005
Abstract We discuss approaches to computing in the Shafarevich–Tate group of Jacobians of higher genus curves, with an emphasis on the theory and practice of visualisation. Especially for hyperelliptic curves, this often enables the computation of ranks of Jacobians, even when the 2-Selmer bound does not bound the rank sharply.
Nils Bruin, E. V. Flynn
openalex   +5 more sources

Carry-based Differential Power Analysis (CDPA) and its Application to Attacking HMAC-SHA-2

open access: diamondTransactions on Cryptographic Hardware and Embedded Systems, 2023
In this paper, we introduce Carry-based Differential Power Analysis (CDPA), a novel methodology that allows for attacking schemes that use arithmetical addition. We apply this methodology to attacking HMAC-SHA-2. We provide full mathematical analysis of
Yaacov Belenky   +6 more
doaj   +3 more sources

Preimage Attacks on Reduced Tiger and SHA-2 [PDF]

open access: bronze, 2009
This paper shows new preimage attacks on reduced Tiger and SHA-2. Indesteege and Preneel presented a preimage attack on Tiger reduced to 13 rounds (out of 24) with a complexity of 2128.5. Our new preimage attack finds a one-block preimage of Tiger reduced to 16 rounds with a complexity of 2161. The proposed attack is based on meet-in-the-middle attacks.
Takanori Isobe, Kyoji Shibutani
openalex   +3 more sources

Simulation Analysis and Comparison of New Hybrid TLI-µTESLA and Variant TESLA Protocols Using SHA-2 and SHA-3 Hash Functions [PDF]

open access: goldSensors, 2022
The evolution of 5G and 6G networks has enhanced the ability of massive IoT devices to provide real-time monitoring and interaction with the surrounding environment.
Khouloud Eledlebi   +5 more
doaj   +2 more sources

Study Security Cloud with SHA-2 Algorithm

open access: green, 2023
This study explores the relationship between cloud computing and security, concentrating on the use of the SHA-2 cryptographic algorithm. Due to the distributed and shared nature of cloud settings, cloud computing has transformed how information and services are accessed and provided. However, it has also created new security issues.
Arnes Yuli Vandika
openalex   +4 more sources

Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 Family [PDF]

open access: bronze, 2012
We present a new concept of biclique as a tool for preimage attacks, which employs many powerful techniques from differential cryptanalysis of block ciphers and hash functions. The new tool has proved to be widely applicable by inspiring many authors to publish new results of the full versions of AES, KASUMI, IDEA, and Square. In this paper, we show
Dmitry Khovratovich   +2 more
openalex   +2 more sources

Routing Using Trust Based System with SHA-2 Authentication

open access: goldProcedia Computer Science, 2015
AbstractMobile Ad hoc NETwork (MANET) is an infrastructure independent network with every mobile node acting as the router in the network formation. These networks are most useful when the present infrastructure is destroyed or at remote locations which are deprived of these amenities.
Ravilla Dilli   +1 more
openalex   +3 more sources

Finding SHA-2 Characteristics: Searching through a Minefield of Contradictions [PDF]

open access: bronze, 2011
In this paper, we analyze the collision resistance of SHA-2 and provide the first results since the beginning of the NIST SHA-3 competition. We extend the previously best known semi-free-start collisions on SHA-256 from 24 to 32 (out of 64) steps and show a collision attack for 27 steps.
Florian Mendel   +2 more
openalex   +2 more sources

Efficient FPGA Hardware Implementation of Secure Hash Function SHA-2 [PDF]

open access: bronzeInternational Journal of Computer Network and Information Security, 2014
The Hash function has been studied by designers with the goal to improve its performances in terms of area, frequency and throughput. The Hash function is used in many embedded systems to provide security. It is become the default choice for security services in numerous applications.
Hassen Mestiri   +3 more
openalex   +3 more sources

Differential Power Analysis of HMAC SHA-2 in the Hamming Weight Model

open access: hybrid, 2013
As any algorithm manipulating secret data, HMAC is potentially vulnerable to side channel attacks. In 2007, McEvoy et al. proposed a differential power analysis attack against HMAC instantiated with hash functions from the SHA-2 family. Their attack works in the Hamming distance leakage model and makes strong assumptions on the target implementation ...
Sonia Belaïd   +4 more
openalex   +3 more sources

Home - About - Disclaimer - Privacy