Results 261 to 270 of about 22,218,864 (289)
Some of the next articles are maybe not open access.

High Throughput and Energy Efficient SHA-2 ASIC Design for Continuous Integrity Checking Applications

IEEE European Test Symposium, 2023
High throughput and energy efficient integrated cryptographic hash primitives are important for the continuous integrity checking and tampering detection in secure access management mechanisms of on-chip instrumentation, such as the IJTAG.
Asimina Koutra, V. Tenentes
semanticscholar   +1 more source

A New Message Expansion Structure for Full Pipeline SHA-2

IEEE Transactions on Circuits and Systems Part 1: Regular Papers, 2021
Once there are constant or infrequently changed bits (COIBs) in two adjacent input messages of SHA-2, the switching power of input messages data registers (IMD-REGs) used for COIBs will disappear.
Yin Zhang   +7 more
semanticscholar   +1 more source

A Coarse Grained Reconfigurable Architecture for SHA-2 Acceleration

IEEE International Symposium on Parallel & Distributed Processing, Workshops and Phd Forum, 2022
The development of high-speed SHA-2 hardware with high flexibility is urgently needed because SHA-2 functions are widely employed in numerous fields, from loT devices to cryp-to currency.
H. Pham   +3 more
semanticscholar   +1 more source

Randomness Analyses of the Secure Hash Algorithms, SHA-1, SHA-2 and Modified SHA

International Conference on Frontiers of Information Technology, 2019
This paper introduces a security analysis scheme for the most famous secure hash algorithms SHA-1 and SHA-2. Both algorithms follow Merkle Damgård structure to compute the corresponding hash function.
Zeyad A. Al-Odat, Assad Abbas, S. Khan
semanticscholar   +1 more source

Quantum Implementation and Analysis of SHA-2 and SHA-3

IEEE Transactions on Emerging Topics in Computing
Quantum computers have the potential to solve a number of hard problems that are believed to be almost impossible to solve by classical computers. This observation has sparked a surge of research to apply quantum algorithms against the cryptographic ...
Kyungbae Jang   +6 more
semanticscholar   +1 more source

Implementation and comparison of the functions of building blocks in SHA-2 family used in secured cloud applications

Journal of Discrete Mathematical Sciences and Cryptography, 2019
A Secure hash algorithm is grounded on the principles of message digest algorithms that are used in the design of the algorithms like MD4 and MD5. The main application of this algorithm is that it can be used in security applications for authentication ...
Alka Leekha, A. Shaikh
semanticscholar   +1 more source

A novel colour image encryption scheme using dynamic DNA coding, chaotic maps, and SHA-2

Multimedia tools and applications, 2022
L. Shane   +6 more
semanticscholar   +1 more source

First Full-Fledged Side Channel Attack on HMAC-SHA-2

International Workshop on Constructive Side-Channel Analysis and Secure Design, 2021
Yaacov Belenky   +5 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy