Results 181 to 190 of about 13,790 (198)
Some of the next articles are maybe not open access.
SCRAM-SHA-256 and SCRAM-SHA-256-PLUS Simple Authentication and Security Layer (SASL) Mechanisms
2015openaire +1 more source
Analysis of SHA-512/224 and SHA-512/256
Lecture Notes in Computer Science, 2015Christoph Dobraunig, Maria Eichlseder
exaly
SHA-256 Hash Generator in Verilog HDL
2025 32nd International Conference on Mixed Design of Integrated Circuits and System (MIXDES)Bartosz Rulka +2 more
openaire +1 more source
Коллизии и необратимость хеш-преобразований в алгоритме SHA-256
2019Хэш-функция – функция, преобразовывающая входную последовательность данных произвольного размера в выходную последовательность фиксированного размера. Процесс преобразования данных называется хеширование. В статье рассмотрены коллизии и необратимость хеш-преобразований в алгоритме SHA-256.
openaire +1 more source
Dynamically Choosing S-Boxes Using SHA-256
2024 International Telecommunications Conference (ITC-Egypt)Mohamed Ahmed +4 more
openaire +1 more source
Collisions and Other Non-random Properties for Step-Reduced SHA-256
Lecture Notes in Computer Science, 2009Bart Preneel
exaly
Design and implementation of totally-self checking SHA-1 and SHA-256 hash functions’ architectures
Microprocessors and Microsystems, 2016George Theodoridis, Andreas Gregoriades
exaly
Multi-core and SIMD Architecture Based Implementation on SHA-256 of Blockchain
Communications in Computer and Information Science, 2021exaly
Blockchain-Powered Certificate Verification using SHA-256 Algorithm
2025 7th International Conference on Intelligent Sustainable Systems (ICISS)R. Syed Ali Fathima +4 more
openaire +1 more source

