Results 11 to 20 of about 35,561 (292)

22-Step Collisions for SHA-2 [PDF]

open access: green, 2008
In this note, we provide the first 22-step collisions for SHA-256 and SHA-512. Detailed technique of generating these collisions will be provided in the next revision of this note.
Somitra Kumar Sanadhya, Palash Sarkar
openalex   +3 more sources

Efficient FPGA Hardware Implementation of Secure Hash Function SHA-2 [PDF]

open access: bronzeInternational Journal of Computer Network and Information Security, 2014
The Hash function has been studied by designers with the goal to improve its performances in terms of area, frequency and throughput. The Hash function is used in many embedded systems to provide security. It is become the default choice for security services in numerous applications.
Hassen Mestiri   +3 more
openalex   +3 more sources

Performance Analysis of Sha-2 and Sha-3 Finalists

open access: greenInternational Journal on Cryptography and Information Security, 2013
National Institute of Science and Technology (NIST) published the first Secure Hash Standard SHA-0 in 1993 as Federal Information Processing Standard publication (FIPS PUBS) which two years later was replaced by SHA-1 to improve the original design and added SHA-2 family by subsequent revisions of the FIPS.
Jagdish Bhatta Ram Krishna Dahal
  +4 more sources

Routing Using Trust Based System with SHA-2 Authentication

open access: diamondProcedia Computer Science, 2015
AbstractMobile Ad hoc NETwork (MANET) is an infrastructure independent network with every mobile node acting as the router in the network formation. These networks are most useful when the present infrastructure is destroyed or at remote locations which are deprived of these amenities.
Ravilla Dilli   +1 more
openalex   +2 more sources

EVALUATION OF THE DURABILITY OF THE SHA-1 AND SHA-2 FAMILY ALGORITHMS

open access: goldMaterials of the All-Russian Scientific and Practical Conference «CHALLENGING ISSUES IN SYSTEMS MODELING AND PROCESSES»
This article discusses the concept of hashing. Special attention is paid to the SHA-1 algorithms and the SHA-2 family, including details of their structure and application. An analysis of the resistance parameters of these algorithms is presented, with an emphasis on comparing their resistance to collision attacks and preimage finding attacks.
A. Abrasimovskaya   +2 more
openalex   +3 more sources

Design SHA-2 MIPS Processor Using FPGA [PDF]

open access: diamondCihan University-Erbil Scientific Journal, 2017
Safaa S. Omran, Laith F. Jumma
openalex   +2 more sources

Differential Power Analysis of HMAC SHA-2 in the Hamming Weight Model [PDF]

open access: goldProceedings of the 10th International Conference on Security and Cryptography, 2013
Sonia Belaïd   +4 more
  +5 more sources

Hardware authentication based on PUFs and SHA-3 2<sup>nd</sup> round candidates [PDF]

open access: green, 2010
Security features are getting a growing interest in microelectronics. Not only entities have to authenticate in the context of a high secure communication but also the hardware employed has to be trusted.
Susana Eiroa, Iluminada Baturone
openalex   +4 more sources

Performance analysis of SHA 2 and SHA 3

open access: greenSSRN Electronic Journal, 2022
Swati Sharma, Loveneet, Saba Khanum
openalex   +2 more sources

Implementation of Security Access Service using SHA-2 Algorithm

open access: diamondInternational Journal of Computer Applications, 2020
Shubhashree Holla, Sirikonda Akhila
openalex   +2 more sources

Home - About - Disclaimer - Privacy