Results 1 to 10 of about 3,253 (144)
Custom ASIC Design for SHA-256 Using Open-Source Tools
The growth of digital communications has driven the development of numerous cryptographic methods for secure data transfer and storage. The SHA-256 algorithm is a cryptographic hash function widely used for validating data authenticity, identity, and ...
Lucas Daudt Franck +4 more
doaj +3 more sources
High-speed SHA-256 algorithm implementation(高速SHA-256算法硬件实现)
SHA-256安全散列算法在数字加密、数字签名中被广泛应用.为满足应用对算法运算速度的要求,提出一种快速实现SHA-256安全散列算法的的硬件新结构.方法通过对算法进行推导,使得能在硬件上实现平衡的四级流水线设计,提高了运算速度.综合结果表明,采用中芯国际0.18 µm工艺,数据吞吐量可达2.89 Gb/ s ,优于目前发表的同类设计结果.
CHENHua-feng(陈华锋)
doaj +2 more sources
SHA-256 Hardware Proposal for IoT Devices in the Blockchain Context [PDF]
This work proposes an implementation of the SHA-256, the most common blockchain hash algorithm, on a field-programmable gate array (FPGA) to improve processing capacity and power saving in Internet of Things (IoT) devices to solve security and privacy ...
Carlos E. B. Santos +4 more
doaj +2 more sources
Penelitian ini mempelajari bagaimana kriptografi menggunakan Secure Hash Algorthm 256 (SHA-256) dan Rivest Shamir Adleman (RSA) untuk menjaga keaslian Surat Keterangan Lulus (SKL) dengan menggunakan kode Quick Response (QR) berbasis web.
Juniar Hutagalung +2 more
doaj +3 more sources
Securing Financial Transactions with a Robust Algorithm: Preventing Double-Spending Attacks
A zero-confirmation transaction is a transaction that has not yet been confirmed on the blockchain and is not yet part of the blockchain. The network propagates zero-confirmation transactions quickly, but they are not secured against double-spending ...
Hasan Hashim +5 more
doaj +1 more source
Algebraic Fault Analysis of SHA-256 Compression Function and Its Application
Cryptographic hash functions play an essential role in various aspects of cryptography, such as message authentication codes, pseudorandom number generation, digital signatures, and so on.
Kazuki Nakamura +2 more
doaj +1 more source
One of the first and most used hashing algorithms in blockchains is SHA-256 so the main aim of this paper is how to increase the security level of the blockchain based on the increasing hashing algorithm security.
Salwa M. Serag Eldin +7 more
doaj +1 more source
Provably secure keyless hash function uses Random Oracle (RO) or Sponge principles for the design and construction of security-centric hash algorithms. It capitalizes the aforesaid principles to produce outcomes like MD2, MD5, SHA-160, SHA-224/256, SHA ...
P. Karthik, P. Shanthi Bala
doaj +1 more source
Construction and Analysis of SHA-256 Compression Function Based on Chaos S-Box
To further improve the security of SHA-256, a compression function construction scheme based on chaotic S-box is proposed. Through the reasonable design of the iteration mode and using the nonlinearity, confusion, and anti-difference of chaotic S-box ...
Juan Wang, Ge Liu, Yongqi Chen, Shu Wang
doaj +1 more source
A High-Performance Multimem SHA-256 Accelerator for Society 5.0
The development of a low-cost high-performance secure hash algorithm (SHA)-256 accelerator has recently received extensive interest because SHA-256 is important in widespread applications, such as cryptocurrencies, data security, data integrity, and ...
Thi Hong Tran +2 more
doaj +1 more source

