Results 1 to 10 of about 37,018 (310)
Fast Implementation of SHA-3 in GPU Environment [PDF]
Recently, Graphic Processing Units (GPUs) have been widely used for general purpose applications such as machine learning applications, acceleration of cryptographic applications (especially, blockchains), etc.
Hojin Choi, Seog Chung Seo
doaj +2 more sources
Analisis Algoritma SHA-3 Keamanan pada Data Pribadi
Data Pribadi merupakan data yang harus dilindungi di era yang serba internet ini. Karena data tersebut berisi informasi penting yang bisa saja menjadi sasaran cyber crime.Beberapa tahun terakhir marak terjadi kasus penyerangan atau hacking yang mengambil data dan digunakan tidak semestinya oleh orang yang tidak bertanggung jawab.
Morita Puspita Sari
openalex +3 more sources
Simulation Analysis and Comparison of New Hybrid TLI-µTESLA and Variant TESLA Protocols Using SHA-2 and SHA-3 Hash Functions [PDF]
The evolution of 5G and 6G networks has enhanced the ability of massive IoT devices to provide real-time monitoring and interaction with the surrounding environment.
Khouloud Eledlebi +5 more
doaj +2 more sources
Comparative Study of Keccak SHA-3 Implementations
This paper conducts an extensive comparative study of state-of-the-art solutions for implementing the SHA-3 hash function. SHA-3, a pivotal component in modern cryptography, has spawned numerous implementations across diverse platforms and technologies ...
Alessandra Dolmeta +2 more
doaj +2 more sources
Extracts from the SHA-3 Competition [PDF]
The story of the SHA-3 competition starts with the presentation of surprisingly efficient attacks on several modern hash functions at Eurocrypt 2005 [1, 2] and at Crypto 2005 [3, 4]. Collisions were given for the hash functions MD4, MD5, RIPEMD and SHA-0.
Vincent Rijmen
openalex +2 more sources
Implementación hardware del algoritmo Keccak para Hash-3 y comparación con Blake, Grøstl, JH y Skein
Las funciones criptográficas Hash convierten un mensaje de longitud variable en un “resumen del mensaje”, y son usadas para aplicaciones de firma digital, códigos de autenticación de mensajes y otras aplicaciones para seguridad informática.
Melissa Ramírez +3 more
doaj +4 more sources
Improving security of lightweith SHA-3 against preimage attacks [PDF]
In this article we describe the SHA-3 algorithm and its internal permutation in which potential weaknesses are hidden. The hash algorithm can be used for different purposes, such aspseudo-random bit sequences generator, key wrapping or one pass ...
Serhii Onopa, Zbigniew Kotulski
doaj +3 more sources
Design Pipeline SHA-3 MIPS Processor using FPGA [PDF]
The purpose of this study is to implement and evaluate the security of the Keccak hash function in a Microprocessor without Interlocked Pipelines (MIPS) processor using Field Programmable Gate Arrays (FPGA). The design methodology involves selecting a set of instructions that are required to run the SHA-3 Keccak algorithm on the MIPS processor.
May S. Al-Rabi
openalex +2 more sources
Evaluating the Energy Costs of SHA-256 and SHA-3 (KangarooTwelve) in Resource-Constrained IoT Devices [PDF]
The rapid expansion of Internet of Things (IoT) devices has heightened the demand for lightweight and secure cryptographic mechanisms suitable for resource-constrained environments.
Iain Baird +4 more
doaj +2 more sources
Compact Hardware Implementation of a SHA-3 Core for Wireless Body Sensor Networks
One of the most important Internet of Things applications is the wireless body sensor network (WBSN), which can provide universal health care, disease prevention, and control.
Yi Yang +3 more
doaj +2 more sources

