Results 281 to 290 of about 35,561 (292)
Some of the next articles are maybe not open access.

USING SIMD TECHNOLOGY TO ACCELERATE SHA-2 FAMILY HASHING FUNCTIONS

SOFT MEASUREMENTS AND COMPUTING
The article presents an approach to the design and development of software code for algorithms of cryptographically resistant hash functions of the SHA-2 family (Secure Hash Algorithm Version 2), which allows to speed up the calculation of the hash code of a message by an order of magnitude.
George V. Belkov, Nikolay V. Bezverkhniy
openaire   +1 more source

A New Image Encryption Scheme Based on Hyperchaotic System and SHA-2

open access: closed, 2022
Kuan Wai Wong   +3 more
openalex   +1 more source

First Full-Fledged Side Channel Attack on HMAC-SHA-2

open access: closed, 2021
Yaacov Belenky   +5 more
openalex   +1 more source

Quantum Implementation and Analysis of SHA-2 and SHA-3

IEEE Transactions on Emerging Topics in Computing
Kyungbae Jang   +6 more
openaire   +1 more source

New Records in Collision Attacks on SHA-2

Yingxin Li, Fukang Liu, Gaoli Wang
openaire   +1 more source

A color image encryption technique using exclusive-OR with DNA complementary rules based on chaos theory and SHA-2

open access: closed, 2018
Aqeel ur Rehman   +4 more
openalex   +1 more source

Home - About - Disclaimer - Privacy