Search

Your search keyword '"SHA-2"' showing total 1,254 results

Search Constraints

Start Over You searched for: Descriptor "SHA-2" Remove constraint Descriptor: "SHA-2"
1,254 results on '"SHA-2"'

Search Results

1. New Records in Collision Attacks on SHA-2

2. Practical Aspects of Vertical Side-Channel Analyses on HMAC-SHA-2

3. CCC-Transformation: Novel Method to Secure Passwords Based on Hash Transformation

4. Security of Hash Functions against Attacks Using Quantum Computers.

7. An Efficient Color-Image Encryption Method Using DNA Sequence and Chaos Cipher.

8. Carry-based Differential Power Analysis (CDPA) and its Application to Attacking HMAC-SHA-2

9. First Full-Fledged Side Channel Attack on HMAC-SHA-2

10. Security and Performance Considerations of Improved Password Authentication Algorithm, Based on OTP and Hash-Chains

11. A High-Efficiency FPGA-Based Multimode SHA-2 Accelerator

13. Secure Hash Function Constructing for Future Communication Systems and Networks

14. A Gray Image Encryption Technique Using the Concept of Water Waves, Chaos and Hash Function

15. SHA-2 Acceleration Meeting the Needs of Emerging Applications: A Comparative Survey

16. Secure Hash Algorithm-2 formed on DNA

17. A Flexible Framework for Exploring, Evaluating, and Comparing SHA-2 Designs

18. A new efficient medical image cipher based on hybrid chaotic map and DNA code.

19. Pseudo-random number generation using LSTMs.

20. Differential Power Analysis of HMAC SHA-1 and HMAC SHA-2 in the Hamming Weight Model

21. Analysis of SHA-512/224 and SHA-512/256

22. Implementation and comparison of the functions of building blocks in SHA-2 family used in secured cloud applications.

23. Hierarchical Bit-Level Image Encryption Based on Chaotic Map and Feistel Network.

24. A High-Efficiency FPGA-Based Multimode SHA-2 Accelerator

26. Improving Local Collisions: New Attacks on Reduced SHA-256

27. Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 Family

28. Converting Meet-In-The-Middle Preimage Attack into Pseudo Collision Attack: Application to SHA-2

29. An Improved Blockchain Technique for Secure Land Registration Data Records

30. Finding SHA-2 Characteristics: Searching through a Minefield of Contradictions

31. Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2

32. An efficient nested chaotic image encryption algorithm based on DNA sequence.

34. A New Message Expansion Structure for Full Pipeline SHA-2

35. Optimization of PBKDF2 Using HMAC-SHA2 and HMAC-LSH Families in CPU Environment

36. A Gray Image Encryption Technique Using the Concept of Water Waves, Chaos and Hash Function

37. Software-defined systems support for secure cloud computing based on data classification.

38. КРИПТОГРАФІЧНА ФУНКЦІЯ ГЕШУВАННЯ SafeBK.

39. Secure data transmission on a distributed cloud server with the help of HMCA and data encryption using optimized CP-ABE-ECC

40. Performance Evaluation of Cryptographic Algorithms on ESP32 with Cryptographic Hardware Acceleration Feature

41. WITHDRAWN: Modified MD5 for enhancing performance of hashing algorithm in Block-Chain

42. A novel chaos-based image encryption using DNA sequence operation and Secure Hash Algorithm SHA-2.

43. Securing IoT Data in the Cloud with Blockchain Technology

44. Securely Storing Searchable String in Database

45. Implementation SHA512 Hash Function And Boyer-Moore String Matching Algorithm For Jpeg/exif Message Digest Compilation

46. Performance and Limitation Review of Secure Hash Function Algorithm

47. A highly efficient color image encryption based on linear transformation using chaos theory and SHA-2

48. Implementation and comparison of the functions of building blocks in SHA-2 family used in secured cloud applications

49. A Flexible Framework for Exploring, Evaluating, and Comparing SHA-2 Designs

50. Lightweight protection of cryptographic hardware accelerators against differential fault analysis

Catalog

Books, media, physical & digital resources