Results 11 to 20 of about 32,440 (142)

SHA-3 on ARM11 Processors

open access: yesAnais do XIV Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais (SBSeg 2014), 2012
This paper presents high-speed assembly implementations of the 256-bit-output versions of all five SHA-3 finalists and of SHA-256 for the ARM11 family of processors. We report new speed records for all of the six implemented functions. For example our implementation of the round-3 version of JH-256 is 35% faster than the fastest implementation of the ...
Peter Schwabe   +2 more
openaire   +4 more sources

A new design paradigm for provably secure keyless hash function with subsets and two variables polynomial function

open access: yesJournal of King Saud University: Computer and Information Sciences, 2022
Provably secure keyless hash function uses Random Oracle (RO) or Sponge principles for the design and construction of security-centric hash algorithms. It capitalizes the aforesaid principles to produce outcomes like MD2, MD5, SHA-160, SHA-224/256, SHA ...
P. Karthik, P. Shanthi Bala
doaj   +1 more source

Comparison of power consumption in pipelined implementations of the BLAKE3 cipher in FPGA devices [PDF]

open access: yesInternational Journal of Electronics and Telecommunications
This article analyzes the dynamic power losses generated by various hardware implementations of the BLAKE3 hash function. Estimations of the parameters were based on the results of post-route simulations of designs implemented in Xilinx Spartan-7 FPGAs ...
Jarosław Sugier
doaj   +3 more sources

Compact Hardware Implementation of a SHA-3 Core for Wireless Body Sensor Networks

open access: yesIEEE Access, 2018
One of the most important Internet of Things applications is the wireless body sensor network (WBSN), which can provide universal health care, disease prevention, and control.
Yi Yang   +3 more
doaj   +1 more source

Do reverse total shoulder replacements have better clinical and functional outcomes than hemiarthroplasty for patients undergoing proximal humeral tumor resection using devitalized autograft composite reconstruction: a case-control study

open access: yesJournal of Orthopaedic Surgery and Research, 2021
Objective To compare the efficacy and prognosis of reverse total shoulder arthroplasty (rTSA) with shoulder hemiarthroplasty (SHA) using devitalized autograft or allograft composite reconstruction after proximal humeral tumor resection.
Dongqing Zuo   +10 more
doaj   +1 more source

Practical Collision Attacks against Round-Reduced SHA-3 [PDF]

open access: yesJournal of Cryptology, 2019
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Guo, Jian   +5 more
openaire   +3 more sources

High Throughput Implementation of the Keccak Hash Function Using the Nios-II Processor

open access: yesTechnologies, 2020
Presently, cryptographic hash functions play a critical role in many applications, such as digital signature systems, security communications, protocols, and network security infrastructures.
Argyrios Sideris   +2 more
doaj   +1 more source

New hash function based on C-MD structure and chaotic neural network

open access: yes网络与信息安全学报, 2023
In recent years, widely used hash algorithms such as MD5 and SHA-1 have been found to have varying degrees of security risks.The iterative structure of the SHA-2 algorithm is similar to that of SHA-1, making it vulnerable to attacks as well.Meanwhile ...
Liquan CHEN   +4 more
doaj   +3 more sources

Silica Xerogel Doped with Iron(III) as Sensor Material for Salicylhydroxamic Acid Determination in Urine

open access: yesGels, 2021
Salicylhydroxamic acid (SHA) is used as antimicrobic medicine and its concentration has to be monitored in urine. For the first time, silica xerogels doped with iron(III) have been proposed as sensor materials for SHA determination in biological samples.
Maria A. Morosanova   +2 more
doaj   +1 more source

Performance Analysis of Modified SHA-3

open access: yesProcedia Technology, 2016
AbstractSecurity services have become an inseparable feature of almost all digital transactions. A crucial module of these scheme isintegrity, which is performed using a cryptographic hash function. Secure Hash Algorithm can be an efficient hashing technique.SHA-3 is the most recent and efficient Secure Hash Algorithm.
Chandran, Nithin R., Manuel, Ebin M.
openaire   +1 more source

Home - About - Disclaimer - Privacy