Results 21 to 30 of about 13,790 (198)

On the Exploitation of a High-throughput SHA-256 FPGA Design for HMAC [PDF]

open access: yes, 2012
High-throughput and area-efficient designs of hash functions and corresponding mechanisms for Message Authentication Codes (MACs) are in high demand due to new security protocols that have arisen and call for security services in every transmitted data ...
Costas E. Goutis   +12 more
core   +1 more source

Keamanan RESTful Web Service Menggunakan JSON Web Token (JWT) HMAC SHA-512

open access: yesJurnal Nasional Teknik Elektro dan Teknologi Informasi, 2018
Day to day information technology is constantly evolving, allowing a wide range of technologies, programming languages, and diverse architectures to keep popping up.
Alam Rahmatulloh   +2 more
doaj   +1 more source

Analysis of Step-Reduced SHA-256 [PDF]

open access: yes, 2006
This is the first article analyzing the security of SHA-256 against fast collision search which considers the recent attacks by Wang et al. We show the limits of applying techniques known so far to SHA-256. Next we introduce a new type of perturbation vector which circumvents the identified limits.
Florian Mendel   +3 more
openaire   +1 more source

Certificate Transparency with Enhancements and Short Proofs [PDF]

open access: yes, 2017
Browsers can detect malicious websites that are provisioned with forged or fake TLS/SSL certificates. However, they are not so good at detecting malicious websites if they are provisioned with mistakenly issued certificates or certificates that have been
Brown, AndrĂ© EX   +11 more
core   +7 more sources

Carry-based Differential Power Analysis (CDPA) and its Application to Attacking HMAC-SHA-2

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2023
In this paper, we introduce Carry-based Differential Power Analysis (CDPA), a novel methodology that allows for attacking schemes that use arithmetical addition. We apply this methodology to attacking HMAC-SHA-2. We provide full mathematical analysis of
Yaacov Belenky   +6 more
doaj   +1 more source

Second-Order Differential Collisions for Reduced SHA-256 [PDF]

open access: yes, 2011
In this work, we introduce a new non-random property for hash/compression functions using the theory of higher order differentials. Based on this, we show a second-order differential collision for the compression function of SHA-256 reduced to 47 out of 64 steps with practical complexity. We have implemented the attack and provide an example.
Biryukov, Alex   +3 more
openaire   +2 more sources

Kode Autentikasi Hash pada Pesan Teks Berbasis Android

open access: yesJurnal Eksplora Informatika, 2018
Autentikasi merupakan hal yang sangat penting dalam pengiriman informasi baik berbentuk data ataupun pesan teks. Hal ini dikarenakan dibutuhkan autentikasi terhadap keaslian dan keutuhan data pada saat pertukaran informasi.
Yusfrizal Bin Pairin
doaj   +1 more source

Implementasi JSON Web Token Berbasis Algoritma SHA-512 untuk Otentikasi Aplikasi BatikKita

open access: yesJurnal RESTI (Rekayasa Sistem dan Teknologi Informasi), 2020
Batikkita is an android based application and web framework laravel web service architecture that is used to bring together between craftsmen and consumers of batik Trusmi and batikkita application with the e-commerce model used is business to customer ...
Andi Setiawan, Ade Irma Purnamasari
doaj   +1 more source

SPHINCS$^+$ post-quantum digital signature scheme with Streebog hash function

open access: yes, 2020
Many commonly used public key cryptosystems will become insecure once a scalable quantum computer is built. New cryptographic schemes that can guarantee protection against attacks with quantum computers, so-called post-quantum algorithms, have emerged in
Anufriev, M. N.   +5 more
core   +1 more source

Area-throughput trade-offs for SHA-1 and SHA-256 hash functions’ pipelined designs [PDF]

open access: yes, 2015
High-throughput designs of hash functions are strongly demanded due to the need for security in every transmitted packet of worldwide e-transactions. Thus, optimized and non-optimized pipelined architectures have been proposed raising, however, important
Athanasiou, George S.   +5 more
core   +3 more sources

Home - About - Disclaimer - Privacy