Results 261 to 270 of about 35,561 (292)
Clinical efficacy and finite element analysis of dynamic crossing screw system in the treatment of non-displaced femoral neck fractures in elderly patients with osteoporosis. [PDF]
Sheng X +7 more
europepmc +1 more source
Antibodies and cryptographic hash functions: quantifying the specificity paradox. [PDF]
Petrella RJ.
europepmc +1 more source
An Evaluation of the Native Hawaiian and Indigenous Health Summer Health Academy. [PDF]
Antonio MCK +12 more
europepmc +1 more source
Oculomotor Palsy after Flow Diverter Treatment for Paraclinoid Aneurysm: Case Report and Literature Review. [PDF]
Higaki A, Namba K.
europepmc +1 more source
Wie beim DES-Nachfolger AES schrieb das US-amerikanische NIST 2007 einen offentlichen Wettbewerb um die Nachfolge des Hashverfahrens SHA-2 aus. Im Oktober 2012 fiel die Wahl auf Keccak. Die Autoren stellen den Hashalgorithmus vor, beschreiben eine Smartcard-Implementierung und stellen das Verfahren dem „amtierenden“ SHA-2-Standard gegenuber.
Pawel Swierczynski +2 more
openalex +2 more sources
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Journal of Discrete Mathematical Sciences and Cryptography, 2003
Abstract In FIPS 180–2, NIST published SHA-2 as a new version of secure hash algorithm. SHA-2 offers four secure hash algorithms including SHA-1, SHA-256, SHA-384, and SHA-512. In other words, SHA-2 may have outputs 160, 256, 384, or 512 bits of message digest. However, SHA-2 algorithm uses fixed and predefined parameters in execution.
Chu-Hsing Lin +2 more
openaire +1 more source
Abstract In FIPS 180–2, NIST published SHA-2 as a new version of secure hash algorithm. SHA-2 offers four secure hash algorithms including SHA-1, SHA-256, SHA-384, and SHA-512. In other words, SHA-2 may have outputs 160, 256, 384, or 512 bits of message digest. However, SHA-2 algorithm uses fixed and predefined parameters in execution.
Chu-Hsing Lin +2 more
openaire +1 more source
In-memory realization of SHA-2 using ReVAMP architecture
2021 34th International Conference on VLSI Design and 2021 20th International Conference on Embedded Systems (VLSID), 2021Emerging non-volatile memory (NVM) technologies with computation capabilities have heralded a new era of non- Von Neumann computing models. Redox-based Resistive RAM (ReRAM) is a prominent NVM technology, which offers high density, low leakage power and ability to perform functionally complete set of Boolean operations.
Debjyoti Bhattacharjee +2 more
openaire +1 more source
Memory optimization of HMAC/SHA-2 encryption
2014 First International Conference on Computational Systems and Communications (ICCSC), 2014Society is undergoing a paradigm shift where the Information and Communication Technology revolution goes along with the evolution of the humankind The Internet is all around us and plays a crucial role in our ability to communicate We often distribute our personal and other classified information using the benefits of the global network Our demands to
R S Rubayya, R Resmi
openaire +1 more source
Implementation of the SHA-2 Hash Family Standard Using FPGAs
The Journal of Supercomputing, 2005zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Sklavos, N., Koufopavlou, O.
openaire +2 more sources

