Results 1 to 10 of about 37,018 (310)

Fast Implementation of SHA-3 in GPU Environment [PDF]

open access: yesIEEE Access, 2021
Recently, Graphic Processing Units (GPUs) have been widely used for general purpose applications such as machine learning applications, acceleration of cryptographic applications (especially, blockchains), etc.
Hojin Choi, Seog Chung Seo
doaj   +2 more sources

Analisis Algoritma SHA-3 Keamanan pada Data Pribadi

open access: diamondJURNAL TECNOSCIENZA, 2021
Data Pribadi merupakan data yang harus dilindungi di era yang serba internet ini. Karena data tersebut berisi informasi penting yang bisa saja menjadi sasaran cyber crime.Beberapa tahun terakhir marak terjadi kasus penyerangan atau hacking yang mengambil data dan digunakan tidak semestinya oleh orang yang tidak bertanggung jawab.
Morita Puspita Sari
openalex   +3 more sources

Simulation Analysis and Comparison of New Hybrid TLI-µTESLA and Variant TESLA Protocols Using SHA-2 and SHA-3 Hash Functions [PDF]

open access: yesSensors, 2022
The evolution of 5G and 6G networks has enhanced the ability of massive IoT devices to provide real-time monitoring and interaction with the surrounding environment.
Khouloud Eledlebi   +5 more
doaj   +2 more sources

Comparative Study of Keccak SHA-3 Implementations

open access: yesCryptography, 2023
This paper conducts an extensive comparative study of state-of-the-art solutions for implementing the SHA-3 hash function. SHA-3, a pivotal component in modern cryptography, has spawned numerous implementations across diverse platforms and technologies ...
Alessandra Dolmeta   +2 more
doaj   +2 more sources

Extracts from the SHA-3 Competition [PDF]

open access: bronze, 2013
The story of the SHA-3 competition starts with the presentation of surprisingly efficient attacks on several modern hash functions at Eurocrypt 2005 [1, 2] and at Crypto 2005 [3, 4]. Collisions were given for the hash functions MD4, MD5, RIPEMD and SHA-0.
Vincent Rijmen
openalex   +2 more sources

Implementación hardware del algoritmo Keccak para Hash-3 y comparación con Blake, Grøstl, JH y Skein

open access: yesInformador Técnico, 2013
Las funciones criptográficas Hash convierten un mensaje de longitud variable en un “resumen del mensaje”, y son usadas para aplicaciones de firma digital, códigos de autenticación de mensajes y otras aplicaciones para seguridad informática.
Melissa Ramírez   +3 more
doaj   +4 more sources

Improving security of lightweith SHA-3 against preimage attacks [PDF]

open access: goldInternational Journal of Electronics and Telecommunications, 2018
In this article we describe the SHA-3 algorithm and its internal permutation in which potential weaknesses are hidden. The hash algorithm can be used for different purposes, such aspseudo-random bit sequences generator, key wrapping or one pass ...
Serhii Onopa, Zbigniew Kotulski
doaj   +3 more sources

Design Pipeline SHA-3 MIPS Processor using FPGA [PDF]

open access: hybridJournal of Scientific Reports, 2023
The purpose of this study is to implement and evaluate the security of the Keccak hash function in a Microprocessor without Interlocked Pipelines (MIPS) processor using Field Programmable Gate Arrays (FPGA). The design methodology involves selecting a set of instructions that are required to run the SHA-3 Keccak algorithm on the MIPS processor.
May S. Al-Rabi
openalex   +2 more sources

Evaluating the Energy Costs of SHA-256 and SHA-3 (KangarooTwelve) in Resource-Constrained IoT Devices [PDF]

open access: goldIoT
The rapid expansion of Internet of Things (IoT) devices has heightened the demand for lightweight and secure cryptographic mechanisms suitable for resource-constrained environments.
Iain Baird   +4 more
doaj   +2 more sources

Compact Hardware Implementation of a SHA-3 Core for Wireless Body Sensor Networks

open access: goldIEEE Access, 2018
One of the most important Internet of Things applications is the wireless body sensor network (WBSN), which can provide universal health care, disease prevention, and control.
Yi Yang   +3 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy