Results 21 to 30 of about 13,790 (198)
On the Exploitation of a High-throughput SHA-256 FPGA Design for HMAC [PDF]
High-throughput and area-efficient designs of hash functions and corresponding mechanisms for Message Authentication Codes (MACs) are in high demand due to new security protocols that have arisen and call for security services in every transmitted data ...
Costas E. Goutis +12 more
core +1 more source
Keamanan RESTful Web Service Menggunakan JSON Web Token (JWT) HMAC SHA-512
Day to day information technology is constantly evolving, allowing a wide range of technologies, programming languages, and diverse architectures to keep popping up.
Alam Rahmatulloh +2 more
doaj +1 more source
Analysis of Step-Reduced SHA-256 [PDF]
This is the first article analyzing the security of SHA-256 against fast collision search which considers the recent attacks by Wang et al. We show the limits of applying techniques known so far to SHA-256. Next we introduce a new type of perturbation vector which circumvents the identified limits.
Florian Mendel +3 more
openaire +1 more source
Certificate Transparency with Enhancements and Short Proofs [PDF]
Browsers can detect malicious websites that are provisioned with forged or fake TLS/SSL certificates. However, they are not so good at detecting malicious websites if they are provisioned with mistakenly issued certificates or certificates that have been
Brown, André EX +11 more
core +7 more sources
Carry-based Differential Power Analysis (CDPA) and its Application to Attacking HMAC-SHA-2
In this paper, we introduce Carry-based Differential Power Analysis (CDPA), a novel methodology that allows for attacking schemes that use arithmetical addition. We apply this methodology to attacking HMAC-SHA-2. We provide full mathematical analysis of
Yaacov Belenky +6 more
doaj +1 more source
Second-Order Differential Collisions for Reduced SHA-256 [PDF]
In this work, we introduce a new non-random property for hash/compression functions using the theory of higher order differentials. Based on this, we show a second-order differential collision for the compression function of SHA-256 reduced to 47 out of 64 steps with practical complexity. We have implemented the attack and provide an example.
Biryukov, Alex +3 more
openaire +2 more sources
Kode Autentikasi Hash pada Pesan Teks Berbasis Android
Autentikasi merupakan hal yang sangat penting dalam pengiriman informasi baik berbentuk data ataupun pesan teks. Hal ini dikarenakan dibutuhkan autentikasi terhadap keaslian dan keutuhan data pada saat pertukaran informasi.
Yusfrizal Bin Pairin
doaj +1 more source
Implementasi JSON Web Token Berbasis Algoritma SHA-512 untuk Otentikasi Aplikasi BatikKita
Batikkita is an android based application and web framework laravel web service architecture that is used to bring together between craftsmen and consumers of batik Trusmi and batikkita application with the e-commerce model used is business to customer ...
Andi Setiawan, Ade Irma Purnamasari
doaj +1 more source
SPHINCS$^+$ post-quantum digital signature scheme with Streebog hash function
Many commonly used public key cryptosystems will become insecure once a scalable quantum computer is built. New cryptographic schemes that can guarantee protection against attacks with quantum computers, so-called post-quantum algorithms, have emerged in
Anufriev, M. N. +5 more
core +1 more source
Area-throughput trade-offs for SHA-1 and SHA-256 hash functions’ pipelined designs [PDF]
High-throughput designs of hash functions are strongly demanded due to the need for security in every transmitted packet of worldwide e-transactions. Thus, optimized and non-optimized pipelined architectures have been proposed raising, however, important
Athanasiou, George S. +5 more
core +3 more sources

