Zobrazeno 1 - 10
of 1 321
pro vyhledávání: '"SHA-2"'
Autor:
Yaacov Belenky, Ira Dushar, Valery Teper, Vadim Bugaenko, Oleg Karavaev, Leonid Azriel, Yury Kreimer
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2023, Iss 3 (2023)
In this paper, we introduce Carry-based Differential Power Analysis (CDPA), a novel methodology that allows for attacking schemes that use arithmetical addition. We apply this methodology to attacking HMAC-SHA-2. We provide full mathematical analysis
Externí odkaz:
https://doaj.org/article/abb1cfc61ead41889044a7a8d0a9e500
Publikováno v:
IEEE Access, Vol 10, Pp 11830-11845 (2022)
The secure hash algorithm 2 (SHA-2) family, including the SHA-224/256/384/512 hash functions, is widely adopted in many modern domains, ranging from Internet of Things devices to cryptocurrency. SHA-2 functions are often implemented on hardware to op
Externí odkaz:
https://doaj.org/article/bf15d60bd1f74de89bbd8b7c3459b3d9
Publikováno v:
IEEE Access, Vol 9, Pp 11675-11693 (2021)
In this article, an innovative encryption technique is developed by getting the inspiration from the natural up-down water wave's phenomena that changes a reflection on pond's surface. The plain image is considered as water pond and stones are throwi
Externí odkaz:
https://doaj.org/article/5da3efda41404b9698e8579ba970cab1
Autor:
Raffaele Martino, Alessandro Cilardo
Publikováno v:
IEEE Access, Vol 8, Pp 28415-28436 (2020)
While SHA-2 is a ubiquitous cryptographic hashing primitive, its role in emerging application domains, e.g. blockchains or trusted IoT components, has made the acceleration of SHA-2 very challenging due to new stringent classes of requirements, espec
Externí odkaz:
https://doaj.org/article/bda5fb849d6d4ed9a874acb56b61e08f
Autor:
Dieaa I. Nassr
Publikováno v:
Journal of the Egyptian Mathematical Society, Vol 27, Iss 1, Pp 1-20 (2019)
Abstract We present a new version of the Secure Hash Algorithm-2 (SHA-2) formed on artificial sequences of deoxyribonucleic acid (DNA). This article is the first attempt to present the implementation of SHA-2 using DNA data processing. We called the
Externí odkaz:
https://doaj.org/article/bb78db12d81242e7b16ae5d19b133888
Autor:
Raffaele Martino, Alessandro Cilardo
Publikováno v:
IEEE Access, Vol 7, Pp 72443-72456 (2019)
Hash functions are a crucial tool in a large variety of applications, ranging from security protocols to cryptocurrencies down to the Internet-of-Things devices used, for example, as biomedical appliances. In particular, SHA-2 is today a ubiquitous h
Externí odkaz:
https://doaj.org/article/922e6cd13fb34647a78a6386f0d545d7
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
IEEE Access, Vol 10, Pp 11830-11845 (2022)
The secure hash algorithm 2 (SHA-2) family, including the SHA-224/256/384/512 hash functions, is widely adopted in many modern domains, ranging from Internet of Things devices to cryptocurrency. SHA-2 functions are often implemented on hardware to op
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
International Journal of Innovative Computing. 11:89-94
The land is a very valuable asset for any government. It’s government job to ensure that the land registration and transfer are done without any fraud, good speed and transparency. The current land registration method employed by the governments ar