Results 171 to 180 of about 13,790 (198)
Some of the next articles are maybe not open access.
Parameterizable FPGA Implementation of SHA-256 using Blockchain Concept
2019 International Conference on Communication and Signal Processing (ICCSP), 2019This paper concentrates on the Design of Parameterizable Implementation of SHA-256 algorithm in FPGA imparting Blockchain Concepts. SHA-256 is the key principle utilized in Blockchain architecture to impart security and privacy into a system. This one way hash function generates unique output for a given input ensuring data authenticity and non ...
Devika K.N., Ramesh Bhakthavatchalu
openaire +1 more source
Proposta de implementação do algoritmo SHA-256 em Hardware
Anais do XVIII Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais (SBSeg 2018), 2018Este trabalho propõe uma arquitetura desenvolvida em Field Programmable Gate Array (FPGA) para o algoritmo de hash SHA-256. O SHA-256 é bastante usado em protocolos para transporte de dados seguros ou verificação de integridade, como o HMAC, TLS e IPSec. A implementação proposta neste artigo traz uma abordagem diferenciada em relação a outros trabalhos
Carlos E. B. Santos Júnior +1 more
openaire +1 more source
Improving Local Collisions: New Attacks on Reduced SHA-256
2013In this paper, we focus on the construction of semi-free-start collisions for SHA-256, and show how to turn them into collisions. We present a collision attack on 28 steps of the hash function with practical complexity. Using a two-block approach we are able to turn a semi-free-start collision into a collision for 31 steps with a complexity of at most ...
Florian Mendel +2 more
openaire +1 more source
Comparative Study of Sha-256 Optimization Techniques
2022 IEEE World AI IoT Congress (AIIoT), 2022Bharat S. Rawal +3 more
openaire +1 more source
An optimized hardware implementation of SHA-256 round computation
The Computer JournalAbstract The SHA-256 algorithm is one of the most widely used secure hashing algorithms. The SHA-256 algorithm is implemented in hardware, and in order to ensure the integrity and authenticity of the encrypted data, this requires higher throughput and efficiency.
Maoqun Yao +3 more
openaire +1 more source
Algorithm for simplifying the SHA-256 operations tree
2023 IEEE International Conference on Cyber Security and Resilience (CSR), 2023Andrey Plotnikov, Alla Levina
openaire +1 more source
Использование хеш-функции SHA-256 в криптовалютном алгоритме BITCOIN
2023Криптографическая хеш-функция – это функция, реализующая алгоритм, выполняющий проверку целостности данных, защиту файлов, а также аутентификацию на основе использования математических преобразований, которые преобразовывают массив данных в состоящую из букв и символов строку фиксированной длины.
openaire +1 more source
Quantum Collision Attacks on Reduced SHA-256 and SHA-512
Lecture Notes in Computer Science, 2021Akinori Hosoyamada
exaly
Breaking Category Five SPHINCS$$^+$$ with SHA-256
2022Ray Perlner, John Kelsey, David Cooper
openaire +1 more source
Blockchain Based Email Communication with SHA-256 Algorithm
2022L. Sherin Beevi +3 more
openaire +1 more source

