Results 271 to 280 of about 35,561 (292)
Some of the next articles are maybe not open access.
A New Message Expansion Structure for Full Pipeline SHA-2
IEEE Transactions on Circuits and Systems I: Regular Papers, 2021Once there are constant or infrequently changed bits (COIBs) in two adjacent input messages of SHA-2, the switching power of input messages data registers (IMD-REGs) used for COIBs will disappear. Meanwhile, when full pipeline SHA-2 is applied in a certain application scenario where the IMD-REGs used for COIBs can be removed, more area of full pipeline
Yin Zhang +7 more
openaire +1 more source
SHA-2 hardware core for virtex-5 FPGA
2015 IEEE 12th International Multi-Conference on Systems, Signals & Devices (SSD15), 2015Hash functions play an important role in modern cryptography. They are widely used to provide services of data integrity and authentication. The hash algorithms are based on performing a number of complex operations on the input data that require a significant amount of computing resources especially when the input data are huge.
Anane Mohamed, Anane Nadjia
openaire +1 more source
Avoiding Data Replication in Cloud Using SHA-2
2018 Internat2018 International Conference on Computation of Power, Energy, Information and Communication (ICCPEIC)ional conference on computation of power, energy, Information and Communication (ICCPEIC), 2018Duplication occurs in cloud when two or more users try to upload same data who are working under a same organization. Deduplication is a process of avoiding the redundant data from the cloud. In previous systems they have used MD5 algorithm, which avoids performs on both file and content level de-duplication check.
R. Raju, S. Aravind Kumar, R. Manikandan
openaire +1 more source
Optimisation of the SHA-2 Family of Hash Functions on FPGAs
IEEE Computer Society Annual Symposium on Emerging VLSI Technologies and Architectures (ISVLSI'06), 2006Hash functions play an important role in modern cryptography. This paper investigates optimisation techniques that have recently been proposed in the literature. A new VLSI architecture for the SHA-256 and SHA-512 hash functions is presented, which combines two popular hardware optimisation techniques, namely pipelining and unrolling.
R.P. McEvoy +3 more
openaire +1 more source
New Local Collisions for the SHA-2 Hash Family
2007The starting point for collision attacks on practical hash functions is a local collision. In this paper, we make a systematic study of local collisions for the SHA-2 family. The possible linear approximations of the constituent Boolean functions are considered and certain impossible conditions for such approximations are identified.
Somitra Kumar Sanadhya, Palash Sarkar
openaire +1 more source
SHA-2 and SHA-3 based sequence randomization algorithm
2016 2nd International Conference on Science and Technology-Computer (ICST), 2016Providing questions with unique sequence helps to encourage participants integrity in an examination. In this study, Secure Hash Algorithm (SHA) 2 and 3 have been proposed and evaluated in a question shuffling problem for computer based test. Two strategies were tested to use the hash algorithms.
Kuntoro Adi Nugroho +2 more
openaire +1 more source
A flexible hardware implementation of SHA-1 and SHA-2 Hash Functions
2011 IEEE International Symposium of Circuits and Systems (ISCAS), 2011This paper summarizes the design of a reprogrammable Application Specific Integrated Circuit capable of performing all members of the Secure Hash Algorithm (SHA) group of Hash Functions. The need for high-speed cryptography is introduced, as well as the SHA-1 and SHA-2 Hash Functions and their operation.
James Docherty, Albert Koelmans
openaire +1 more source
On the hardware implementations of the SHA-2 (256, 384, 512) hash functions
Proceedings of the 2003 International Symposium on Circuits and Systems, 2003. ISCAS '03., 2003Couple to the communications wired and unwired networks growth, is the increasing demand for strong secure data transmission. New cryptographic standards are developed, and new encryption algorithms are designed, in order to satisfy the special needs for security. SHA-2 is the newest powerful standard in the hash functions families.
N. Sklavos, O. Koufopavlou
openaire +1 more source
Incorporating SHA-2 256 with OFB to realize a novel encryption method
2015 World Symposium on Computer Networks and Information Security (WSCNIS), 2015The SHA-2 hash function is used in many fields of security system such as digital signature, tamper detection, password protection and so on. SHA-2 is very important algorithm for integrity and authentication realization, SHA-2 is a one way algorithm to produce hash code of any message with 256 random hash bits (that's according to the version of SHA-2)
Raaed K. Ibrahim +2 more
openaire +1 more source
A Coarse Grained Reconfigurable Architecture for SHA-2 Acceleration
2022 IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW), 2022Hoai Luan Pham +3 more
openaire +1 more source

