Results 1 to 10 of about 13,771 (179)

SHA-256 Hardware Proposal for IoT Devices in the Blockchain Context [PDF]

open access: yesSensors
This work proposes an implementation of the SHA-256, the most common blockchain hash algorithm, on a field-programmable gate array (FPGA) to improve processing capacity and power saving in Internet of Things (IoT) devices to solve security and privacy ...
Lucileide Medeiros Dantas da Silva   +2 more
exaly   +4 more sources

Algebraic Fault Analysis of SHA-256 Compression Function and Its Application

open access: yesInformation (Switzerland), 2021
Cryptographic hash functions play an essential role in various aspects of cryptography, such as message authentication codes, pseudorandom number generation, digital signatures, and so on.
Shoichi Hirose
exaly   +3 more sources

A High-Performance Multimem SHA-256 Accelerator for Society 5.0

open access: yesIEEE Access, 2021
The development of a low-cost high-performance secure hash algorithm (SHA)-256 accelerator has recently received extensive interest because SHA-256 is important in widespread applications, such as cryptocurrencies, data security, data integrity, and ...
Thi Hong Tran   +2 more
exaly   +3 more sources

Double SHA-256 Hardware Architecture With Compact Message Expander for Bitcoin Mining

open access: yesIEEE Access, 2020
In the Bitcoin network, computing double SHA-256 values consumes most of the network energy. Therefore, reducing the power consumption and increasing the processing rate for the double SHA256 algorithm is currently an important research trend.
Pham Hoai Luan   +2 more
exaly   +3 more sources

Analysis of a SHA-256 Variant [PDF]

open access: yesLecture Notes in Computer Science, 2006
SHA-256 is a cryptographic hash function which was proposed in 2000 as a new generation of SHA functions and was adopted as FIPS standard in 2002. In this paper we will consider a SHA-256 variant and a SHACAL-2 variant in which every arithmetic addition is replaced by XOR operation.
Hirotaka Yoshida, Alex Biryukov
exaly   +2 more sources

Custom ASIC Design for SHA-256 Using Open-Source Tools

open access: yesComputers, 2023
The growth of digital communications has driven the development of numerous cryptographic methods for secure data transfer and storage. The SHA-256 algorithm is a cryptographic hash function widely used for validating data authenticity, identity, and ...
Lucas Daudt Franck   +4 more
doaj   +3 more sources

High-speed SHA-256 algorithm implementation(高速SHA-256算法硬件实现)

open access: yesZhejiang Daxue xuebao. Lixue ban, 2009
SHA-256安全散列算法在数字加密、数字签名中被广泛应用.为满足应用对算法运算速度的要求,提出一种快速实现SHA-256安全散列算法的的硬件新结构.方法通过对算法进行推导,使得能在硬件上实现平衡的四级流水线设计,提高了运算速度.综合结果表明,采用中芯国际0.18 µm工艺,数据吞吐量可达2.89 Gb/ s ,优于目前发表的同类设计结果.
CHENHua-feng(陈华锋)
doaj   +2 more sources

Keamanan Data Menggunakan Secure Hashing Algorithm (SHA)-256 dan Rivest Shamir Adleman (RSA) pada Digital Signature

open access: yesJurnal Teknologi Informasi dan Ilmu Komputer, 2023
Penelitian ini mempelajari bagaimana kriptografi menggunakan Secure Hash Algorthm 256 (SHA-256) dan Rivest Shamir Adleman (RSA) untuk menjaga keaslian Surat Keterangan Lulus (SKL) dengan menggunakan kode Quick Response (QR) berbasis web.
Juniar Hutagalung   +2 more
doaj   +3 more sources

Securing Financial Transactions with a Robust Algorithm: Preventing Double-Spending Attacks

open access: yesComputers, 2023
A zero-confirmation transaction is a transaction that has not yet been confirmed on the blockchain and is not yet part of the blockchain. The network propagates zero-confirmation transactions quickly, but they are not secured against double-spending ...
Hasan Hashim   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy