Results 271 to 280 of about 22,218,864 (289)
Some of the next articles are maybe not open access.

New Records in Collision Attacks on SHA-2

IACR Cryptology ePrint Archive
Yingxin Li, Fukang Liu, Gaoli Wang
semanticscholar   +1 more source

A highly efficient color image encryption based on linear transformation using chaos theory and SHA-2

Multimedia tools and applications, 2019
Amnah Firdous   +2 more
semanticscholar   +1 more source

Design of SHA-1 & SHA-2 MIPS processor using FPGA

2017 Annual Conference on New Trends in Information & Communications Technology Applications (NTICT), 2017
S. Omran, Laith F. Jumma
semanticscholar   +1 more source

A novel chaos-based encryption approach for future-generation passive optical networks using SHA-2

IEEE\/OSA Journal of Optical Communications and Networking, 2017
Harsimranjit Singh Gill   +2 more
semanticscholar   +1 more source

Digital signature using MAC address based AES-128 and SHA-2 256-bit

2017 International Seminar on Application for Technology of Information and Communication (iSemantic), 2017
Kadek Dwi Budi Utama   +3 more
semanticscholar   +1 more source

Design of multithreading SHA-1 & SHA-2 MIPS processor using FPGA

2017 8th International Conference on Information Technology (ICIT), 2017
S. Omran, Laith F. Jumma
semanticscholar   +1 more source

SHA-2 and SHA-3 based sequence randomization algorithm

International Conference on Information Control Systems & Technologies, 2016
Kuntoro Adi Nugroho   +2 more
semanticscholar   +1 more source

Replacing SHA-2 with SHA-3 Enhances Generic Security of HMAC

The Cryptographer's Track at RSA Conference, 2016
Yusuke Naito, Lei Wang
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy