Results 281 to 290 of about 35,561 (292)
Some of the next articles are maybe not open access.
USING SIMD TECHNOLOGY TO ACCELERATE SHA-2 FAMILY HASHING FUNCTIONS
SOFT MEASUREMENTS AND COMPUTINGThe article presents an approach to the design and development of software code for algorithms of cryptographically resistant hash functions of the SHA-2 family (Secure Hash Algorithm Version 2), which allows to speed up the calculation of the hash code of a message by an order of magnitude.
George V. Belkov, Nikolay V. Bezverkhniy
openaire +1 more source
A New Image Encryption Scheme Based on Hyperchaotic System and SHA-2
Kuan Wai Wong +3 more
openalex +1 more source
First Full-Fledged Side Channel Attack on HMAC-SHA-2
Yaacov Belenky +5 more
openalex +1 more source
Quantum Implementation and Analysis of SHA-2 and SHA-3
IEEE Transactions on Emerging Topics in ComputingKyungbae Jang +6 more
openaire +1 more source
Bezpečnost a použitelnost základních hashovacích funkcí, zejména MD-5, SHA-1 a SHA-2
Barbora Galaczová
openalex

