Results 141 to 150 of about 3,272 (163)
Some of the next articles are maybe not open access.

FPGA-based implementation of the SHA-256 hash algorithm

2020 IEEE International Conference on Design & Test of Integrated Micro & Nano-Systems (DTS), 2020
SHA-2 is one of the most popular hash functions since it ensures the integrity and the authenticity of information. However, this efficiency is verified at the cost of increasing the computational complexity and the power consumption. To overcome these drawbacks, the hardware acceleration is adopted as a solution in this work to guarantee the best ...
Manel Kammoun   +3 more
openaire   +1 more source

Reversing Eight Rounds of SHA-256

This paper demonstrates a method to deterministically reverse the first eight rounds (iterations) of the SHA-256 compression function. By tracking the propagation of a single message schedule word through the internal state and expressing its effect algebraically across rounds, we isolate and recover its original value from the final state. The results
openaire   +2 more sources

Verification of a cryptographic primitive: SHA-256 (abstract)

Proceedings of the 36th ACM SIGPLAN Conference on Programming Language Design and Implementation, 2015
A full formal machine-checked verification of a C program: the OpenSSL implementation of SHA-256. This is an interactive proof of functional correctness in the Coq proof assistant, using the Verifiable C program logic. Verifiable C is a separation logic for the C language, proved sound w.r.t.
openaire   +1 more source

An optimized pipelined architecture of SHA-256 hash function

2017 7th International Symposium on Embedded Computing and System Design (ISED), 2017
Real time applications of digital communication systems are rapidly increasing. Due to this there is a huge demand for high level of security. In cryptographic algorithms, SHA-256 has become an integral part in many applications. A hardware implementation of the SHA-256 hash algorithm is physically separate from the main processor and hence, it has ...
Meelu Padhi, Ravindra Chaudhari
openaire   +1 more source

Parameterizable FPGA Implementation of SHA-256 using Blockchain Concept

2019 International Conference on Communication and Signal Processing (ICCSP), 2019
This paper concentrates on the Design of Parameterizable Implementation of SHA-256 algorithm in FPGA imparting Blockchain Concepts. SHA-256 is the key principle utilized in Blockchain architecture to impart security and privacy into a system. This one way hash function generates unique output for a given input ensuring data authenticity and non ...
Devika K.N., Ramesh Bhakthavatchalu
openaire   +1 more source

Proposta de implementação do algoritmo SHA-256 em Hardware

Anais do XVIII Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais (SBSeg 2018), 2018
Este trabalho propõe uma arquitetura desenvolvida em Field Programmable Gate Array (FPGA) para o algoritmo de hash SHA-256. O SHA-256 é bastante usado em protocolos para transporte de dados seguros ou verificação de integridade, como o HMAC, TLS e IPSec. A implementação proposta neste artigo traz uma abordagem diferenciada em relação a outros trabalhos
Carlos E. B. Santos Júnior   +1 more
openaire   +1 more source

Improving Local Collisions: New Attacks on Reduced SHA-256

2013
In this paper, we focus on the construction of semi-free-start collisions for SHA-256, and show how to turn them into collisions. We present a collision attack on 28 steps of the hash function with practical complexity. Using a two-block approach we are able to turn a semi-free-start collision into a collision for 31 steps with a complexity of at most ...
Florian Mendel   +2 more
openaire   +1 more source

Comparative Study of Sha-256 Optimization Techniques

2022 IEEE World AI IoT Congress (AIIoT), 2022
Bharat S. Rawal   +3 more
openaire   +1 more source

An optimized hardware implementation of SHA-256 round computation

The Computer Journal
Abstract The SHA-256 algorithm is one of the most widely used secure hashing algorithms. The SHA-256 algorithm is implemented in hardware, and in order to ensure the integrity and authenticity of the encrypted data, this requires higher throughput and efficiency.
Maoqun Yao   +3 more
openaire   +1 more source

Algorithm for simplifying the SHA-256 operations tree

2023 IEEE International Conference on Cyber Security and Resilience (CSR), 2023
Andrey Plotnikov, Alla Levina
openaire   +1 more source

Home - About - Disclaimer - Privacy