Results 221 to 230 of about 32,432 (238)
Some of the next articles are maybe not open access.
SHA-2 hardware core for virtex-5 FPGA
2015 IEEE 12th International Multi-Conference on Systems, Signals & Devices (SSD15), 2015Hash functions play an important role in modern cryptography. They are widely used to provide services of data integrity and authentication. The hash algorithms are based on performing a number of complex operations on the input data that require a significant amount of computing resources especially when the input data are huge.
Anane Mohamed, Anane Nadjia
openaire +1 more source
Avoiding Data Replication in Cloud Using SHA-2
2018 Internat2018 International Conference on Computation of Power, Energy, Information and Communication (ICCPEIC)ional conference on computation of power, energy, Information and Communication (ICCPEIC), 2018Duplication occurs in cloud when two or more users try to upload same data who are working under a same organization. Deduplication is a process of avoiding the redundant data from the cloud. In previous systems they have used MD5 algorithm, which avoids performs on both file and content level de-duplication check.
R. Raju, S. Aravind Kumar, R. Manikandan
openaire +1 more source
Implementation of the SHA-2 Hash Family Standard Using FPGAs
The Journal of Supercomputing, 2005zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Sklavos, N., Koufopavlou, O.
openaire +2 more sources
A New Message Expansion Structure for Full Pipeline SHA-2
IEEE Transactions on Circuits and Systems I: Regular Papers, 2021Once there are constant or infrequently changed bits (COIBs) in two adjacent input messages of SHA-2, the switching power of input messages data registers (IMD-REGs) used for COIBs will disappear. Meanwhile, when full pipeline SHA-2 is applied in a certain application scenario where the IMD-REGs used for COIBs can be removed, more area of full pipeline
Yin Zhang +7 more
openaire +1 more source
SHA-2 and SHA-3 based sequence randomization algorithm
2016 2nd International Conference on Science and Technology-Computer (ICST), 2016Providing questions with unique sequence helps to encourage participants integrity in an examination. In this study, Secure Hash Algorithm (SHA) 2 and 3 have been proposed and evaluated in a question shuffling problem for computer based test. Two strategies were tested to use the hash algorithms.
Kuntoro Adi Nugroho +2 more
openaire +1 more source
New Local Collisions for the SHA-2 Hash Family
2007The starting point for collision attacks on practical hash functions is a local collision. In this paper, we make a systematic study of local collisions for the SHA-2 family. The possible linear approximations of the constituent Boolean functions are considered and certain impossible conditions for such approximations are identified.
Somitra Kumar Sanadhya, Palash Sarkar
openaire +1 more source
Thermal noise random number generator based on SHA-2 (512)
2005 International Conference on Machine Learning and Cybernetics, 2005Couple to the rapid development of cryptography, the strength of security protocols and encryption algorithms consumingly relies on the quality of random number. This paper presents a new and security random number generator architecture. The philosophy architecture is based on SHA-2 (512) hash function whose security strength ensures the ...
null Yu-Hua Wang +3 more
openaire +1 more source
First Full-Fledged Side Channel Attack on HMAC-SHA-2
2021Side-channel attacks pose a threat to cryptographic algorithms. Hash functions, in particular those from the SHA-2 family, can also be an interesting target if some of their inputs are secret. HMAC is an important use case of a hash function, in which the input is partially secret and thus unknown to the attacker.
Yaacov Belenky +5 more
openaire +1 more source
Performance analysis of SHA 2 and SHA 3
SSRN Electronic Journal, 2022Swati Sharma, Loveneet ., Saba Khanum
openaire +1 more source
USING SIMD TECHNOLOGY TO ACCELERATE SHA-2 FAMILY HASHING FUNCTIONS
SOFT MEASUREMENTS AND COMPUTINGThe article presents an approach to the design and development of software code for algorithms of cryptographically resistant hash functions of the SHA-2 family (Secure Hash Algorithm Version 2), which allows to speed up the calculation of the hash code of a message by an order of magnitude.
George V. Belkov, Nikolay V. Bezverkhniy
openaire +1 more source

