Results 11 to 20 of about 35,561 (292)
22-Step Collisions for SHA-2 [PDF]
In this note, we provide the first 22-step collisions for SHA-256 and SHA-512. Detailed technique of generating these collisions will be provided in the next revision of this note.
Somitra Kumar Sanadhya, Palash Sarkar
openalex +3 more sources
Efficient FPGA Hardware Implementation of Secure Hash Function SHA-2 [PDF]
The Hash function has been studied by designers with the goal to improve its performances in terms of area, frequency and throughput. The Hash function is used in many embedded systems to provide security. It is become the default choice for security services in numerous applications.
Hassen Mestiri +3 more
openalex +3 more sources
Performance Analysis of Sha-2 and Sha-3 Finalists
National Institute of Science and Technology (NIST) published the first Secure Hash Standard SHA-0 in 1993 as Federal Information Processing Standard publication (FIPS PUBS) which two years later was replaced by SHA-1 to improve the original design and added SHA-2 family by subsequent revisions of the FIPS.
Jagdish Bhatta Ram Krishna Dahal
+4 more sources
Routing Using Trust Based System with SHA-2 Authentication
AbstractMobile Ad hoc NETwork (MANET) is an infrastructure independent network with every mobile node acting as the router in the network formation. These networks are most useful when the present infrastructure is destroyed or at remote locations which are deprived of these amenities.
Ravilla Dilli +1 more
openalex +2 more sources
EVALUATION OF THE DURABILITY OF THE SHA-1 AND SHA-2 FAMILY ALGORITHMS
This article discusses the concept of hashing. Special attention is paid to the SHA-1 algorithms and the SHA-2 family, including details of their structure and application. An analysis of the resistance parameters of these algorithms is presented, with an emphasis on comparing their resistance to collision attacks and preimage finding attacks.
A. Abrasimovskaya +2 more
openalex +3 more sources
Design SHA-2 MIPS Processor Using FPGA [PDF]
Safaa S. Omran, Laith F. Jumma
openalex +2 more sources
Differential Power Analysis of HMAC SHA-2 in the Hamming Weight Model [PDF]
Sonia Belaïd +4 more
+5 more sources
Hardware authentication based on PUFs and SHA-3 2<sup>nd</sup> round candidates [PDF]
Security features are getting a growing interest in microelectronics. Not only entities have to authenticate in the context of a high secure communication but also the hardware employed has to be trusted.
Susana Eiroa, Iluminada Baturone
openalex +4 more sources
Performance analysis of SHA 2 and SHA 3
Swati Sharma, Loveneet, Saba Khanum
openalex +2 more sources
Implementation of Security Access Service using SHA-2 Algorithm
Shubhashree Holla, Sirikonda Akhila
openalex +2 more sources

