Results 281 to 289 of about 22,218,864 (289)
Some of the next articles are maybe not open access.
High performance SHA-2 core using the Round Pipelined Technique
IEEE International Conference on Electronics, Computing and Communication Technologies, 2015Manoj D. Rote, David Selvakumar
semanticscholar +1 more source
Incorporating SHA-2 256 with OFB to realize a novel encryption method
2015 World Symposium on Computer Networks and Information Security (WSCNIS), 2015Raaed K. Ibrahim +2 more
semanticscholar +1 more source
SHA-2 hardware core for virtex-5 FPGA
2015 IEEE 12th International Multi-Conference on Systems, Signals & Devices (SSD15), 2015M. Anane, N. Anane
semanticscholar +1 more source
Memory optimization of HMAC/SHA-2 encryption
IEEE International Conference on Circuits and Systems for Communications, 2014R. S. Rubayya, R. Resmi
semanticscholar +1 more source
Differential Power Analysis of HMAC SHA-1 and HMAC SHA-2 in the Hamming Weight Model
International Conference on E-Business and Telecommunication Networks, 2014Sonia Belaïd +4 more
semanticscholar +1 more source
IEEE Transactions on Aerospace and Electronic Systems, 2013
M. Juliato, C. Gebotys
semanticscholar +1 more source
M. Juliato, C. Gebotys
semanticscholar +1 more source
Converting Meet-In-The-Middle Preimage Attack into Pseudo Collision Attack: Application to SHA-2
Fast Software Encryption Workshop, 2012Ji Li, Takanori Isobe, Kyoji Shibutani
semanticscholar +1 more source
Performance Evaluation of SHA-2 Standard vs. SHA-3 Finalists on Two Freescale Platforms
International Journal of Secure Software Engineering, 2013Pal-Stefan Murvay, B. Groza
semanticscholar +1 more source

