Results 271 to 280 of about 22,218,864 (289)
Some of the next articles are maybe not open access.
New Records in Collision Attacks on SHA-2
IACR Cryptology ePrint ArchiveYingxin Li, Fukang Liu, Gaoli Wang
semanticscholar +1 more source
Design of SHA-1 & SHA-2 MIPS processor using FPGA
2017 Annual Conference on New Trends in Information & Communications Technology Applications (NTICT), 2017S. Omran, Laith F. Jumma
semanticscholar +1 more source
A novel chaos-based encryption approach for future-generation passive optical networks using SHA-2
IEEE\/OSA Journal of Optical Communications and Networking, 2017Harsimranjit Singh Gill +2 more
semanticscholar +1 more source
Digital signature using MAC address based AES-128 and SHA-2 256-bit
2017 International Seminar on Application for Technology of Information and Communication (iSemantic), 2017Kadek Dwi Budi Utama +3 more
semanticscholar +1 more source
Design of multithreading SHA-1 & SHA-2 MIPS processor using FPGA
2017 8th International Conference on Information Technology (ICIT), 2017S. Omran, Laith F. Jumma
semanticscholar +1 more source
A novel chaos-based image encryption using DNA sequence operation and Secure Hash Algorithm SHA-2
Nonlinear dynamics, 2015Ramzi Guesmi +3 more
semanticscholar +1 more source
SHA-2 and SHA-3 based sequence randomization algorithm
International Conference on Information Control Systems & Technologies, 2016Kuntoro Adi Nugroho +2 more
semanticscholar +1 more source
Replacing SHA-2 with SHA-3 Enhances Generic Security of HMAC
The Cryptographer's Track at RSA Conference, 2016Yusuke Naito, Lei Wang
semanticscholar +1 more source

