Results 171 to 180 of about 13,790 (198)
Some of the next articles are maybe not open access.

Parameterizable FPGA Implementation of SHA-256 using Blockchain Concept

2019 International Conference on Communication and Signal Processing (ICCSP), 2019
This paper concentrates on the Design of Parameterizable Implementation of SHA-256 algorithm in FPGA imparting Blockchain Concepts. SHA-256 is the key principle utilized in Blockchain architecture to impart security and privacy into a system. This one way hash function generates unique output for a given input ensuring data authenticity and non ...
Devika K.N., Ramesh Bhakthavatchalu
openaire   +1 more source

Proposta de implementação do algoritmo SHA-256 em Hardware

Anais do XVIII Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais (SBSeg 2018), 2018
Este trabalho propõe uma arquitetura desenvolvida em Field Programmable Gate Array (FPGA) para o algoritmo de hash SHA-256. O SHA-256 é bastante usado em protocolos para transporte de dados seguros ou verificação de integridade, como o HMAC, TLS e IPSec. A implementação proposta neste artigo traz uma abordagem diferenciada em relação a outros trabalhos
Carlos E. B. Santos Júnior   +1 more
openaire   +1 more source

Improving Local Collisions: New Attacks on Reduced SHA-256

2013
In this paper, we focus on the construction of semi-free-start collisions for SHA-256, and show how to turn them into collisions. We present a collision attack on 28 steps of the hash function with practical complexity. Using a two-block approach we are able to turn a semi-free-start collision into a collision for 31 steps with a complexity of at most ...
Florian Mendel   +2 more
openaire   +1 more source

Comparative Study of Sha-256 Optimization Techniques

2022 IEEE World AI IoT Congress (AIIoT), 2022
Bharat S. Rawal   +3 more
openaire   +1 more source

An optimized hardware implementation of SHA-256 round computation

The Computer Journal
Abstract The SHA-256 algorithm is one of the most widely used secure hashing algorithms. The SHA-256 algorithm is implemented in hardware, and in order to ensure the integrity and authenticity of the encrypted data, this requires higher throughput and efficiency.
Maoqun Yao   +3 more
openaire   +1 more source

Algorithm for simplifying the SHA-256 operations tree

2023 IEEE International Conference on Cyber Security and Resilience (CSR), 2023
Andrey Plotnikov, Alla Levina
openaire   +1 more source

Использование хеш-функции SHA-256 в криптовалютном алгоритме BITCOIN

2023
Криптографическая хеш-функция – это функция, реализующая алгоритм, выполняющий проверку целостности данных, защиту файлов, а также аутентификацию на основе использования математических преобразований, которые преобразовывают массив данных в состоящую из букв и символов строку фиксированной длины.
openaire   +1 more source

Quantum Collision Attacks on Reduced SHA-256 and SHA-512

Lecture Notes in Computer Science, 2021
Akinori Hosoyamada
exaly  

Breaking Category Five SPHINCS$$^+$$ with SHA-256

2022
Ray Perlner, John Kelsey, David Cooper
openaire   +1 more source

Blockchain Based Email Communication with SHA-256 Algorithm

2022
L. Sherin Beevi   +3 more
openaire   +1 more source

Home - About - Disclaimer - Privacy