Results 281 to 289 of about 22,218,864 (289)
Some of the next articles are maybe not open access.

High performance SHA-2 core using the Round Pipelined Technique

IEEE International Conference on Electronics, Computing and Communication Technologies, 2015
Manoj D. Rote, David Selvakumar
semanticscholar   +1 more source

Incorporating SHA-2 256 with OFB to realize a novel encryption method

2015 World Symposium on Computer Networks and Information Security (WSCNIS), 2015
Raaed K. Ibrahim   +2 more
semanticscholar   +1 more source

SHA-2 hardware core for virtex-5 FPGA

2015 IEEE 12th International Multi-Conference on Systems, Signals & Devices (SSD15), 2015
M. Anane, N. Anane
semanticscholar   +1 more source

Secure Hashing: SHA-1, SHA-2, and SHA-3

, 2016
Deniz Toz   +7 more
semanticscholar   +1 more source

Memory optimization of HMAC/SHA-2 encryption

IEEE International Conference on Circuits and Systems for Communications, 2014
R. S. Rubayya, R. Resmi
semanticscholar   +1 more source

Differential Power Analysis of HMAC SHA-1 and HMAC SHA-2 in the Hamming Weight Model

International Conference on E-Business and Telecommunication Networks, 2014
Sonia Belaïd   +4 more
semanticscholar   +1 more source

A Quantitative Analysis of a Novel SEU-Resistant SHA-2 and HMAC Architecture for Space Missions Security

IEEE Transactions on Aerospace and Electronic Systems, 2013
M. Juliato, C. Gebotys
semanticscholar   +1 more source

Converting Meet-In-The-Middle Preimage Attack into Pseudo Collision Attack: Application to SHA-2

Fast Software Encryption Workshop, 2012
Ji Li, Takanori Isobe, Kyoji Shibutani
semanticscholar   +1 more source

Performance Evaluation of SHA-2 Standard vs. SHA-3 Finalists on Two Freescale Platforms

International Journal of Secure Software Engineering, 2013
Pal-Stefan Murvay, B. Groza
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy