Results 131 to 140 of about 3,272 (163)
Some of the next articles are maybe not open access.

Related searches:

Multiple Hashing Using SHA-256 and MD5

2021
Message Digest 5 (MD5) is a hashing function with numerous vulnerabilities such as pre-image vulnerability and collision vulnerability which restrict the usage of MD5. Therefore, by using other hashing functions such as SHA prior to hashing with MD5, we can use MD5 for various applications such as data integrity without compromising the security of the
Gautham P. Reddy   +4 more
openaire   +1 more source

Использование алгоритма SHA-256 для хеширования данных

ТЕНДЕНЦИИ РАЗВИТИЯ НАУКИ И ОБРАЗОВАНИЯ, 2022
В современном мире как никогда важны криптографические хеш-функции, используемые для выполнения большого спектра задач, в которых важна защита данных. Алгоритмов хеширования в мире насчитывается огромное количество. Одним из наиболее распространенных и защищенных является алгоритм SHA-256.
openaire   +1 more source

VLSI implementation of high-speed SHA-256

2009 IEEE 8th International Conference on ASIC, 2009
To accelerate the speed of iterative computation for the existing SHA-256 algorithm, using 7-3-2 array compressor is proposed to reduce the critical path delay in this paper. The frequency of the proposed scheme is 1.7 times higher than other VLSI implementations under the same process.
null Ling Bai, null Shuguo Li
openaire   +1 more source

Authentication Process in Smart Card Using Sha-256

Journal of Computational and Theoretical Nanoscience, 2020
Smart cards are related to the issues of security. The applications of smart card are manipulated in hardware, software and telecommunications which appears to be a big issue. In this paper we introduce a new design which is a secured 2 level processing in authentication which uses the number of the pin as 1st authenticated level by the use of SHA-256.
V. Teju   +2 more
openaire   +1 more source

An FPGA Based SHA-256 Processor

2002
The design, implementation and system level performance of an efficient yet compact field programmable gate array (FPGA) based Secure Hash Algorithm 256 (SHA-256) processor is presented. On a Xilinx Virtex XCV300E-8 FPGA, the SHA-256 processor utilizes 1261 slices and has a throughput of 87 MB/s at 88 MHz.
Kurt K. Ting   +3 more
openaire   +1 more source

A High-Throughput Hardware Implementation of SHA-256 Algorithm

2020 IEEE International Symposium on Circuits and Systems (ISCAS), 2020
The SHA-256 algorithm is widely used in the field of security. In this paper, we propose a rescheduling method for the SHA-256 round computation. Based on the proposed rescheduling, we propose a design for SHA-256, in which the critical path is reduced. Our design is implemented on the Xilinx Virtex-4 FPGA.
Yimeng Chen, Shuguo Li
openaire   +1 more source

Validating of Digital Forensic Images Using SHA-256

2019 International Conference on Cyber Security and Internet of Things (ICSIoT), 2019
Volumes of digital images are produced per time, whiles these digital images may be for friendly and or social activities they can be manipulated for illegal purposes. Sensitive digital images have been a core part of security correspondences between sensitive institutions. Such sensitive digital images security has been a prime concern.
Kester Quist-Aphetsi   +1 more
openaire   +1 more source

A Configurable Implementation of the SHA-256 Hash Function

2019
This paper proposes a hardware solution for the SHA-256 hash function offering a number of configurable architecture-level features. This flexibility allows for exploring various trade-offs between performance, area occupation, and power consumption. As confirmed by the experimental results, the approach succeeds in exposing the effects of different ...
Martino, Raffaele, Cilardo, Alessandro
openaire   +2 more sources

Home - About - Disclaimer - Privacy