Results 221 to 230 of about 32,432 (238)
Some of the next articles are maybe not open access.

SHA-2 hardware core for virtex-5 FPGA

2015 IEEE 12th International Multi-Conference on Systems, Signals & Devices (SSD15), 2015
Hash functions play an important role in modern cryptography. They are widely used to provide services of data integrity and authentication. The hash algorithms are based on performing a number of complex operations on the input data that require a significant amount of computing resources especially when the input data are huge.
Anane Mohamed, Anane Nadjia
openaire   +1 more source

Avoiding Data Replication in Cloud Using SHA-2

2018 Internat2018 International Conference on Computation of Power, Energy, Information and Communication (ICCPEIC)ional conference on computation of power, energy, Information and Communication (ICCPEIC), 2018
Duplication occurs in cloud when two or more users try to upload same data who are working under a same organization. Deduplication is a process of avoiding the redundant data from the cloud. In previous systems they have used MD5 algorithm, which avoids performs on both file and content level de-duplication check.
R. Raju, S. Aravind Kumar, R. Manikandan
openaire   +1 more source

Implementation of the SHA-2 Hash Family Standard Using FPGAs

The Journal of Supercomputing, 2005
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Sklavos, N., Koufopavlou, O.
openaire   +2 more sources

A New Message Expansion Structure for Full Pipeline SHA-2

IEEE Transactions on Circuits and Systems I: Regular Papers, 2021
Once there are constant or infrequently changed bits (COIBs) in two adjacent input messages of SHA-2, the switching power of input messages data registers (IMD-REGs) used for COIBs will disappear. Meanwhile, when full pipeline SHA-2 is applied in a certain application scenario where the IMD-REGs used for COIBs can be removed, more area of full pipeline
Yin Zhang   +7 more
openaire   +1 more source

SHA-2 and SHA-3 based sequence randomization algorithm

2016 2nd International Conference on Science and Technology-Computer (ICST), 2016
Providing questions with unique sequence helps to encourage participants integrity in an examination. In this study, Secure Hash Algorithm (SHA) 2 and 3 have been proposed and evaluated in a question shuffling problem for computer based test. Two strategies were tested to use the hash algorithms.
Kuntoro Adi Nugroho   +2 more
openaire   +1 more source

New Local Collisions for the SHA-2 Hash Family

2007
The starting point for collision attacks on practical hash functions is a local collision. In this paper, we make a systematic study of local collisions for the SHA-2 family. The possible linear approximations of the constituent Boolean functions are considered and certain impossible conditions for such approximations are identified.
Somitra Kumar Sanadhya, Palash Sarkar
openaire   +1 more source

Thermal noise random number generator based on SHA-2 (512)

2005 International Conference on Machine Learning and Cybernetics, 2005
Couple to the rapid development of cryptography, the strength of security protocols and encryption algorithms consumingly relies on the quality of random number. This paper presents a new and security random number generator architecture. The philosophy architecture is based on SHA-2 (512) hash function whose security strength ensures the ...
null Yu-Hua Wang   +3 more
openaire   +1 more source

First Full-Fledged Side Channel Attack on HMAC-SHA-2

2021
Side-channel attacks pose a threat to cryptographic algorithms. Hash functions, in particular those from the SHA-2 family, can also be an interesting target if some of their inputs are secret. HMAC is an important use case of a hash function, in which the input is partially secret and thus unknown to the attacker.
Yaacov Belenky   +5 more
openaire   +1 more source

Performance analysis of SHA 2 and SHA 3

SSRN Electronic Journal, 2022
Swati Sharma, Loveneet ., Saba Khanum
openaire   +1 more source

USING SIMD TECHNOLOGY TO ACCELERATE SHA-2 FAMILY HASHING FUNCTIONS

SOFT MEASUREMENTS AND COMPUTING
The article presents an approach to the design and development of software code for algorithms of cryptographically resistant hash functions of the SHA-2 family (Secure Hash Algorithm Version 2), which allows to speed up the calculation of the hash code of a message by an order of magnitude.
George V. Belkov, Nikolay V. Bezverkhniy
openaire   +1 more source

Home - About - Disclaimer - Privacy