Results 211 to 220 of about 32,432 (238)

SHA-2 will soon retire : the SHA-3 song

open access: yes, 2010
Naehrig, M., Peters, C.P., Schwabe, P.
openaire   +1 more source
Some of the next articles are maybe not open access.

Related searches:

Keyed/Unkeyed SHA-2

Journal of Discrete Mathematical Sciences and Cryptography, 2003
Abstract In FIPS 180–2, NIST published SHA-2 as a new version of secure hash algorithm. SHA-2 offers four secure hash algorithms including SHA-1, SHA-256, SHA-384, and SHA-512. In other words, SHA-2 may have outputs 160, 256, 384, or 512 bits of message digest. However, SHA-2 algorithm uses fixed and predefined parameters in execution.
Chu-Hsing Lin   +2 more
openaire   +1 more source

Keccak und der SHA-2

Datenschutz und Datensicherheit - DuD, 2013
Wie beim DES-Nachfolger AES schrieb das US-amerikanische NIST 2007 einen offentlichen Wettbewerb um die Nachfolge des Hashverfahrens SHA-2 aus. Im Oktober 2012 fiel die Wahl auf Keccak. Die Autoren stellen den Hashalgorithmus vor, beschreiben eine Smartcard-Implementierung und stellen das Verfahren dem „amtierenden“ SHA-2-Standard gegenuber.
Pawel Swierczynski   +2 more
openaire   +1 more source

In-memory realization of SHA-2 using ReVAMP architecture

2021 34th International Conference on VLSI Design and 2021 20th International Conference on Embedded Systems (VLSID), 2021
Emerging non-volatile memory (NVM) technologies with computation capabilities have heralded a new era of non- Von Neumann computing models. Redox-based Resistive RAM (ReRAM) is a prominent NVM technology, which offers high density, low leakage power and ability to perform functionally complete set of Boolean operations.
Debjyoti Bhattacharjee   +2 more
openaire   +1 more source

Memory optimization of HMAC/SHA-2 encryption

2014 First International Conference on Computational Systems and Communications (ICCSC), 2014
Society is undergoing a paradigm shift where the Information and Communication Technology revolution goes along with the evolution of the humankind The Internet is all around us and plays a crucial role in our ability to communicate We often distribute our personal and other classified information using the benefits of the global network Our demands to
R S Rubayya, R Resmi
openaire   +1 more source

Home - About - Disclaimer - Privacy