Results 141 to 150 of about 3,272 (163)
Some of the next articles are maybe not open access.
FPGA-based implementation of the SHA-256 hash algorithm
2020 IEEE International Conference on Design & Test of Integrated Micro & Nano-Systems (DTS), 2020SHA-2 is one of the most popular hash functions since it ensures the integrity and the authenticity of information. However, this efficiency is verified at the cost of increasing the computational complexity and the power consumption. To overcome these drawbacks, the hardware acceleration is adopted as a solution in this work to guarantee the best ...
Manel Kammoun +3 more
openaire +1 more source
Reversing Eight Rounds of SHA-256
This paper demonstrates a method to deterministically reverse the first eight rounds (iterations) of the SHA-256 compression function. By tracking the propagation of a single message schedule word through the internal state and expressing its effect algebraically across rounds, we isolate and recover its original value from the final state. The resultsopenaire +2 more sources
Verification of a cryptographic primitive: SHA-256 (abstract)
Proceedings of the 36th ACM SIGPLAN Conference on Programming Language Design and Implementation, 2015A full formal machine-checked verification of a C program: the OpenSSL implementation of SHA-256. This is an interactive proof of functional correctness in the Coq proof assistant, using the Verifiable C program logic. Verifiable C is a separation logic for the C language, proved sound w.r.t.
openaire +1 more source
An optimized pipelined architecture of SHA-256 hash function
2017 7th International Symposium on Embedded Computing and System Design (ISED), 2017Real time applications of digital communication systems are rapidly increasing. Due to this there is a huge demand for high level of security. In cryptographic algorithms, SHA-256 has become an integral part in many applications. A hardware implementation of the SHA-256 hash algorithm is physically separate from the main processor and hence, it has ...
Meelu Padhi, Ravindra Chaudhari
openaire +1 more source
Parameterizable FPGA Implementation of SHA-256 using Blockchain Concept
2019 International Conference on Communication and Signal Processing (ICCSP), 2019This paper concentrates on the Design of Parameterizable Implementation of SHA-256 algorithm in FPGA imparting Blockchain Concepts. SHA-256 is the key principle utilized in Blockchain architecture to impart security and privacy into a system. This one way hash function generates unique output for a given input ensuring data authenticity and non ...
Devika K.N., Ramesh Bhakthavatchalu
openaire +1 more source
Proposta de implementação do algoritmo SHA-256 em Hardware
Anais do XVIII Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais (SBSeg 2018), 2018Este trabalho propõe uma arquitetura desenvolvida em Field Programmable Gate Array (FPGA) para o algoritmo de hash SHA-256. O SHA-256 é bastante usado em protocolos para transporte de dados seguros ou verificação de integridade, como o HMAC, TLS e IPSec. A implementação proposta neste artigo traz uma abordagem diferenciada em relação a outros trabalhos
Carlos E. B. Santos Júnior +1 more
openaire +1 more source
Improving Local Collisions: New Attacks on Reduced SHA-256
2013In this paper, we focus on the construction of semi-free-start collisions for SHA-256, and show how to turn them into collisions. We present a collision attack on 28 steps of the hash function with practical complexity. Using a two-block approach we are able to turn a semi-free-start collision into a collision for 31 steps with a complexity of at most ...
Florian Mendel +2 more
openaire +1 more source
Comparative Study of Sha-256 Optimization Techniques
2022 IEEE World AI IoT Congress (AIIoT), 2022Bharat S. Rawal +3 more
openaire +1 more source
An optimized hardware implementation of SHA-256 round computation
The Computer JournalAbstract The SHA-256 algorithm is one of the most widely used secure hashing algorithms. The SHA-256 algorithm is implemented in hardware, and in order to ensure the integrity and authenticity of the encrypted data, this requires higher throughput and efficiency.
Maoqun Yao +3 more
openaire +1 more source
Algorithm for simplifying the SHA-256 operations tree
2023 IEEE International Conference on Cyber Security and Resilience (CSR), 2023Andrey Plotnikov, Alla Levina
openaire +1 more source

