Results 131 to 140 of about 3,272 (163)
Provably lightweight and secure IoHT scheme with post-quantum cryptography and fog computing: A comprehensive scheme for healthcare system. [PDF]
Abood EW +4 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Multiple Hashing Using SHA-256 and MD5
2021Message Digest 5 (MD5) is a hashing function with numerous vulnerabilities such as pre-image vulnerability and collision vulnerability which restrict the usage of MD5. Therefore, by using other hashing functions such as SHA prior to hashing with MD5, we can use MD5 for various applications such as data integrity without compromising the security of the
Gautham P. Reddy +4 more
openaire +1 more source
Использование алгоритма SHA-256 для хеширования данных
ТЕНДЕНЦИИ РАЗВИТИЯ НАУКИ И ОБРАЗОВАНИЯ, 2022В современном мире как никогда важны криптографические хеш-функции, используемые для выполнения большого спектра задач, в которых важна защита данных. Алгоритмов хеширования в мире насчитывается огромное количество. Одним из наиболее распространенных и защищенных является алгоритм SHA-256.
openaire +1 more source
VLSI implementation of high-speed SHA-256
2009 IEEE 8th International Conference on ASIC, 2009To accelerate the speed of iterative computation for the existing SHA-256 algorithm, using 7-3-2 array compressor is proposed to reduce the critical path delay in this paper. The frequency of the proposed scheme is 1.7 times higher than other VLSI implementations under the same process.
null Ling Bai, null Shuguo Li
openaire +1 more source
Authentication Process in Smart Card Using Sha-256
Journal of Computational and Theoretical Nanoscience, 2020Smart cards are related to the issues of security. The applications of smart card are manipulated in hardware, software and telecommunications which appears to be a big issue. In this paper we introduce a new design which is a secured 2 level processing in authentication which uses the number of the pin as 1st authenticated level by the use of SHA-256.
V. Teju +2 more
openaire +1 more source
An FPGA Based SHA-256 Processor
2002The design, implementation and system level performance of an efficient yet compact field programmable gate array (FPGA) based Secure Hash Algorithm 256 (SHA-256) processor is presented. On a Xilinx Virtex XCV300E-8 FPGA, the SHA-256 processor utilizes 1261 slices and has a throughput of 87 MB/s at 88 MHz.
Kurt K. Ting +3 more
openaire +1 more source
A High-Throughput Hardware Implementation of SHA-256 Algorithm
2020 IEEE International Symposium on Circuits and Systems (ISCAS), 2020The SHA-256 algorithm is widely used in the field of security. In this paper, we propose a rescheduling method for the SHA-256 round computation. Based on the proposed rescheduling, we propose a design for SHA-256, in which the critical path is reduced. Our design is implemented on the Xilinx Virtex-4 FPGA.
Yimeng Chen, Shuguo Li
openaire +1 more source
Validating of Digital Forensic Images Using SHA-256
2019 International Conference on Cyber Security and Internet of Things (ICSIoT), 2019Volumes of digital images are produced per time, whiles these digital images may be for friendly and or social activities they can be manipulated for illegal purposes. Sensitive digital images have been a core part of security correspondences between sensitive institutions. Such sensitive digital images security has been a prime concern.
Kester Quist-Aphetsi +1 more
openaire +1 more source
A Configurable Implementation of the SHA-256 Hash Function
2019This paper proposes a hardware solution for the SHA-256 hash function offering a number of configurable architecture-level features. This flexibility allows for exploring various trade-offs between performance, area occupation, and power consumption. As confirmed by the experimental results, the approach succeeds in exposing the effects of different ...
Martino, Raffaele, Cilardo, Alessandro
openaire +2 more sources

