Results 271 to 280 of about 35,561 (292)
Some of the next articles are maybe not open access.

A New Message Expansion Structure for Full Pipeline SHA-2

IEEE Transactions on Circuits and Systems I: Regular Papers, 2021
Once there are constant or infrequently changed bits (COIBs) in two adjacent input messages of SHA-2, the switching power of input messages data registers (IMD-REGs) used for COIBs will disappear. Meanwhile, when full pipeline SHA-2 is applied in a certain application scenario where the IMD-REGs used for COIBs can be removed, more area of full pipeline
Yin Zhang   +7 more
openaire   +1 more source

SHA-2 hardware core for virtex-5 FPGA

2015 IEEE 12th International Multi-Conference on Systems, Signals & Devices (SSD15), 2015
Hash functions play an important role in modern cryptography. They are widely used to provide services of data integrity and authentication. The hash algorithms are based on performing a number of complex operations on the input data that require a significant amount of computing resources especially when the input data are huge.
Anane Mohamed, Anane Nadjia
openaire   +1 more source

Avoiding Data Replication in Cloud Using SHA-2

2018 Internat2018 International Conference on Computation of Power, Energy, Information and Communication (ICCPEIC)ional conference on computation of power, energy, Information and Communication (ICCPEIC), 2018
Duplication occurs in cloud when two or more users try to upload same data who are working under a same organization. Deduplication is a process of avoiding the redundant data from the cloud. In previous systems they have used MD5 algorithm, which avoids performs on both file and content level de-duplication check.
R. Raju, S. Aravind Kumar, R. Manikandan
openaire   +1 more source

Optimisation of the SHA-2 Family of Hash Functions on FPGAs

IEEE Computer Society Annual Symposium on Emerging VLSI Technologies and Architectures (ISVLSI'06), 2006
Hash functions play an important role in modern cryptography. This paper investigates optimisation techniques that have recently been proposed in the literature. A new VLSI architecture for the SHA-256 and SHA-512 hash functions is presented, which combines two popular hardware optimisation techniques, namely pipelining and unrolling.
R.P. McEvoy   +3 more
openaire   +1 more source

New Local Collisions for the SHA-2 Hash Family

2007
The starting point for collision attacks on practical hash functions is a local collision. In this paper, we make a systematic study of local collisions for the SHA-2 family. The possible linear approximations of the constituent Boolean functions are considered and certain impossible conditions for such approximations are identified.
Somitra Kumar Sanadhya, Palash Sarkar
openaire   +1 more source

SHA-2 and SHA-3 based sequence randomization algorithm

2016 2nd International Conference on Science and Technology-Computer (ICST), 2016
Providing questions with unique sequence helps to encourage participants integrity in an examination. In this study, Secure Hash Algorithm (SHA) 2 and 3 have been proposed and evaluated in a question shuffling problem for computer based test. Two strategies were tested to use the hash algorithms.
Kuntoro Adi Nugroho   +2 more
openaire   +1 more source

A flexible hardware implementation of SHA-1 and SHA-2 Hash Functions

2011 IEEE International Symposium of Circuits and Systems (ISCAS), 2011
This paper summarizes the design of a reprogrammable Application Specific Integrated Circuit capable of performing all members of the Secure Hash Algorithm (SHA) group of Hash Functions. The need for high-speed cryptography is introduced, as well as the SHA-1 and SHA-2 Hash Functions and their operation.
James Docherty, Albert Koelmans
openaire   +1 more source

On the hardware implementations of the SHA-2 (256, 384, 512) hash functions

Proceedings of the 2003 International Symposium on Circuits and Systems, 2003. ISCAS '03., 2003
Couple to the communications wired and unwired networks growth, is the increasing demand for strong secure data transmission. New cryptographic standards are developed, and new encryption algorithms are designed, in order to satisfy the special needs for security. SHA-2 is the newest powerful standard in the hash functions families.
N. Sklavos, O. Koufopavlou
openaire   +1 more source

Incorporating SHA-2 256 with OFB to realize a novel encryption method

2015 World Symposium on Computer Networks and Information Security (WSCNIS), 2015
The SHA-2 hash function is used in many fields of security system such as digital signature, tamper detection, password protection and so on. SHA-2 is very important algorithm for integrity and authentication realization, SHA-2 is a one way algorithm to produce hash code of any message with 256 random hash bits (that's according to the version of SHA-2)
Raaed K. Ibrahim   +2 more
openaire   +1 more source

A Coarse Grained Reconfigurable Architecture for SHA-2 Acceleration

2022 IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW), 2022
Hoai Luan Pham   +3 more
openaire   +1 more source

Home - About - Disclaimer - Privacy