Results 261 to 270 of about 35,561 (292)

An Evaluation of the Native Hawaiian and Indigenous Health Summer Health Academy. [PDF]

open access: yesHawaii J Health Soc Welf
Antonio MCK   +12 more
europepmc   +1 more source

Keccak und der SHA-2

open access: closedDatenschutz und Datensicherheit - DuD, 2013
Wie beim DES-Nachfolger AES schrieb das US-amerikanische NIST 2007 einen offentlichen Wettbewerb um die Nachfolge des Hashverfahrens SHA-2 aus. Im Oktober 2012 fiel die Wahl auf Keccak. Die Autoren stellen den Hashalgorithmus vor, beschreiben eine Smartcard-Implementierung und stellen das Verfahren dem „amtierenden“ SHA-2-Standard gegenuber.
Pawel Swierczynski   +2 more
openalex   +2 more sources

Keyed/Unkeyed SHA-2

Journal of Discrete Mathematical Sciences and Cryptography, 2003
Abstract In FIPS 180–2, NIST published SHA-2 as a new version of secure hash algorithm. SHA-2 offers four secure hash algorithms including SHA-1, SHA-256, SHA-384, and SHA-512. In other words, SHA-2 may have outputs 160, 256, 384, or 512 bits of message digest. However, SHA-2 algorithm uses fixed and predefined parameters in execution.
Chu-Hsing Lin   +2 more
openaire   +1 more source

In-memory realization of SHA-2 using ReVAMP architecture

2021 34th International Conference on VLSI Design and 2021 20th International Conference on Embedded Systems (VLSID), 2021
Emerging non-volatile memory (NVM) technologies with computation capabilities have heralded a new era of non- Von Neumann computing models. Redox-based Resistive RAM (ReRAM) is a prominent NVM technology, which offers high density, low leakage power and ability to perform functionally complete set of Boolean operations.
Debjyoti Bhattacharjee   +2 more
openaire   +1 more source

Memory optimization of HMAC/SHA-2 encryption

2014 First International Conference on Computational Systems and Communications (ICCSC), 2014
Society is undergoing a paradigm shift where the Information and Communication Technology revolution goes along with the evolution of the humankind The Internet is all around us and plays a crucial role in our ability to communicate We often distribute our personal and other classified information using the benefits of the global network Our demands to
R S Rubayya, R Resmi
openaire   +1 more source

Implementation of the SHA-2 Hash Family Standard Using FPGAs

The Journal of Supercomputing, 2005
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Sklavos, N., Koufopavlou, O.
openaire   +2 more sources

Home - About - Disclaimer - Privacy