Results 161 to 170 of about 13,790 (198)
Some of the next articles are maybe not open access.
Authentication Process in Smart Card Using Sha-256
Journal of Computational and Theoretical Nanoscience, 2020Smart cards are related to the issues of security. The applications of smart card are manipulated in hardware, software and telecommunications which appears to be a big issue. In this paper we introduce a new design which is a secured 2 level processing in authentication which uses the number of the pin as 1st authenticated level by the use of SHA-256.
V. Teju +2 more
openaire +1 more source
The First Practical Collision forĀ 31-Step SHA-256
Lecture Notes in Computer ScienceGaoli Wang
exaly +2 more sources
A High Performance Hardware Implementation of SHA-256 Algorithm
2024 IEEE 4th International Conference on Information Technology, Big Data and Artificial Intelligence (ICIBA)Tuo Li +5 more
exaly +2 more sources
An FPGA Based SHA-256 Processor
2002The design, implementation and system level performance of an efficient yet compact field programmable gate array (FPGA) based Secure Hash Algorithm 256 (SHA-256) processor is presented. On a Xilinx Virtex XCV300E-8 FPGA, the SHA-256 processor utilizes 1261 slices and has a throughput of 87 MB/s at 88 MHz.
Kurt K. Ting +3 more
openaire +1 more source
Validating of Digital Forensic Images Using SHA-256
2019 International Conference on Cyber Security and Internet of Things (ICSIoT), 2019Volumes of digital images are produced per time, whiles these digital images may be for friendly and or social activities they can be manipulated for illegal purposes. Sensitive digital images have been a core part of security correspondences between sensitive institutions. Such sensitive digital images security has been a prime concern.
Kester Quist-Aphetsi +1 more
openaire +1 more source
A Configurable Implementation of the SHA-256 Hash Function
2019This paper proposes a hardware solution for the SHA-256 hash function offering a number of configurable architecture-level features. This flexibility allows for exploring various trade-offs between performance, area occupation, and power consumption. As confirmed by the experimental results, the approach succeeds in exposing the effects of different ...
Martino, Raffaele, Cilardo, Alessandro
openaire +2 more sources
FPGA-based implementation of the SHA-256 hash algorithm
2020 IEEE International Conference on Design & Test of Integrated Micro & Nano-Systems (DTS), 2020SHA-2 is one of the most popular hash functions since it ensures the integrity and the authenticity of information. However, this efficiency is verified at the cost of increasing the computational complexity and the power consumption. To overcome these drawbacks, the hardware acceleration is adopted as a solution in this work to guarantee the best ...
Manel Kammoun +3 more
openaire +1 more source
Reversing Eight Rounds of SHA-256
This paper demonstrates a method to deterministically reverse the first eight rounds (iterations) of the SHA-256 compression function. By tracking the propagation of a single message schedule word through the internal state and expressing its effect algebraically across rounds, we isolate and recover its original value from the final state. The resultsopenaire +2 more sources
Verification of a cryptographic primitive: SHA-256 (abstract)
Proceedings of the 36th ACM SIGPLAN Conference on Programming Language Design and Implementation, 2015A full formal machine-checked verification of a C program: the OpenSSL implementation of SHA-256. This is an interactive proof of functional correctness in the Coq proof assistant, using the Verifiable C program logic. Verifiable C is a separation logic for the C language, proved sound w.r.t.
openaire +1 more source
An optimized pipelined architecture of SHA-256 hash function
2017 7th International Symposium on Embedded Computing and System Design (ISED), 2017Real time applications of digital communication systems are rapidly increasing. Due to this there is a huge demand for high level of security. In cryptographic algorithms, SHA-256 has become an integral part in many applications. A hardware implementation of the SHA-256 hash algorithm is physically separate from the main processor and hence, it has ...
Meelu Padhi, Ravindra Chaudhari
openaire +1 more source

