Results 1 to 10 of about 3,253 (144)

Custom ASIC Design for SHA-256 Using Open-Source Tools

open access: yesComputers, 2023
The growth of digital communications has driven the development of numerous cryptographic methods for secure data transfer and storage. The SHA-256 algorithm is a cryptographic hash function widely used for validating data authenticity, identity, and ...
Lucas Daudt Franck   +4 more
doaj   +3 more sources

High-speed SHA-256 algorithm implementation(高速SHA-256算法硬件实现)

open access: yesZhejiang Daxue xuebao. Lixue ban, 2009
SHA-256安全散列算法在数字加密、数字签名中被广泛应用.为满足应用对算法运算速度的要求,提出一种快速实现SHA-256安全散列算法的的硬件新结构.方法通过对算法进行推导,使得能在硬件上实现平衡的四级流水线设计,提高了运算速度.综合结果表明,采用中芯国际0.18 µm工艺,数据吞吐量可达2.89 Gb/ s ,优于目前发表的同类设计结果.
CHENHua-feng(陈华锋)
doaj   +2 more sources

SHA-256 Hardware Proposal for IoT Devices in the Blockchain Context [PDF]

open access: yesSensors
This work proposes an implementation of the SHA-256, the most common blockchain hash algorithm, on a field-programmable gate array (FPGA) to improve processing capacity and power saving in Internet of Things (IoT) devices to solve security and privacy ...
Carlos E. B. Santos   +4 more
doaj   +2 more sources

Keamanan Data Menggunakan Secure Hashing Algorithm (SHA)-256 dan Rivest Shamir Adleman (RSA) pada Digital Signature

open access: yesJurnal Teknologi Informasi dan Ilmu Komputer, 2023
Penelitian ini mempelajari bagaimana kriptografi menggunakan Secure Hash Algorthm 256 (SHA-256) dan Rivest Shamir Adleman (RSA) untuk menjaga keaslian Surat Keterangan Lulus (SKL) dengan menggunakan kode Quick Response (QR) berbasis web.
Juniar Hutagalung   +2 more
doaj   +3 more sources

Securing Financial Transactions with a Robust Algorithm: Preventing Double-Spending Attacks

open access: yesComputers, 2023
A zero-confirmation transaction is a transaction that has not yet been confirmed on the blockchain and is not yet part of the blockchain. The network propagates zero-confirmation transactions quickly, but they are not secured against double-spending ...
Hasan Hashim   +5 more
doaj   +1 more source

Algebraic Fault Analysis of SHA-256 Compression Function and Its Application

open access: yesInformation, 2021
Cryptographic hash functions play an essential role in various aspects of cryptography, such as message authentication codes, pseudorandom number generation, digital signatures, and so on.
Kazuki Nakamura   +2 more
doaj   +1 more source

Design and Analysis of New Version of Cryptographic Hash Function Based on Improved Chaotic Maps With Induced DNA Sequences

open access: yesIEEE Access, 2023
One of the first and most used hashing algorithms in blockchains is SHA-256 so the main aim of this paper is how to increase the security level of the blockchain based on the increasing hashing algorithm security.
Salwa M. Serag Eldin   +7 more
doaj   +1 more source

A new design paradigm for provably secure keyless hash function with subsets and two variables polynomial function

open access: yesJournal of King Saud University: Computer and Information Sciences, 2022
Provably secure keyless hash function uses Random Oracle (RO) or Sponge principles for the design and construction of security-centric hash algorithms. It capitalizes the aforesaid principles to produce outcomes like MD2, MD5, SHA-160, SHA-224/256, SHA ...
P. Karthik, P. Shanthi Bala
doaj   +1 more source

Construction and Analysis of SHA-256 Compression Function Based on Chaos S-Box

open access: yesIEEE Access, 2021
To further improve the security of SHA-256, a compression function construction scheme based on chaotic S-box is proposed. Through the reasonable design of the iteration mode and using the nonlinearity, confusion, and anti-difference of chaotic S-box ...
Juan Wang, Ge Liu, Yongqi Chen, Shu Wang
doaj   +1 more source

A High-Performance Multimem SHA-256 Accelerator for Society 5.0

open access: yesIEEE Access, 2021
The development of a low-cost high-performance secure hash algorithm (SHA)-256 accelerator has recently received extensive interest because SHA-256 is important in widespread applications, such as cryptocurrencies, data security, data integrity, and ...
Thi Hong Tran   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy