Results 181 to 190 of about 13,790 (198)
Some of the next articles are maybe not open access.

Analysis of SHA-512/224 and SHA-512/256

Lecture Notes in Computer Science, 2015
Christoph Dobraunig, Maria Eichlseder
exaly  

SHA-256 Hash Generator in Verilog HDL

2025 32nd International Conference on Mixed Design of Integrated Circuits and System (MIXDES)
Bartosz Rulka   +2 more
openaire   +1 more source

Коллизии и необратимость хеш-преобразований в алгоритме SHA-256

2019
Хэш-функция – функция, преобразовывающая входную последовательность данных произвольного размера в выходную последовательность фиксированного размера. Процесс преобразования данных называется хеширование. В статье рассмотрены коллизии и необратимость хеш-преобразований в алгоритме SHA-256.
openaire   +1 more source

Dynamically Choosing S-Boxes Using SHA-256

2024 International Telecommunications Conference (ITC-Egypt)
Mohamed Ahmed   +4 more
openaire   +1 more source

Collisions and Other Non-random Properties for Step-Reduced SHA-256

Lecture Notes in Computer Science, 2009
Bart Preneel
exaly  

Design and implementation of totally-self checking SHA-1 and SHA-256 hash functions’ architectures

Microprocessors and Microsystems, 2016
George Theodoridis, Andreas Gregoriades
exaly  

Multi-core and SIMD Architecture Based Implementation on SHA-256 of Blockchain

Communications in Computer and Information Science, 2021
exaly  

Blockchain-Powered Certificate Verification using SHA-256 Algorithm

2025 7th International Conference on Intelligent Sustainable Systems (ICISS)
R. Syed Ali Fathima   +4 more
openaire   +1 more source

Home - About - Disclaimer - Privacy