Search

Your search keyword '"SHA-3"' showing total 528 results

Search Constraints

Start Over You searched for: Descriptor "SHA-3" Remove constraint Descriptor: "SHA-3"
528 results on '"SHA-3"'

Search Results

2. Optimizing FPGA Resource Allocation for SHA-3 Using DSP48 and Pipelining Techniques

3. Optimized Software Implementation of Keccak, Kyber, and Dilithium on RV{32,64}IM{B}{V}

7. Breaking Ground: A New Area Record for Low-Latency First-Order Masked SHA-3

8. Comparison of power consumption in pipelined implementations of the BLAKE3 cipher in FPGA devices

9. Cryptographic Competitions.

10. Comparison of power consumption in pipelined implementations of the BLAKE3 cipher in FPGA devices.

11. Comparative Study of Keccak SHA-3 Implementations.

12. An evolutionary algorithmic framework cloud based evidence collection architecture.

15. Meta-Analysis of Popular Encryption and Hashing Algorithms

16. Power Analysis of BLAKE3 Pipelined Implementations in FPGA Devices

21. 3D IC Integration Using Blockchain

23. A Secure Biometric Novel Approach for Authentication Using Multi-Fingerprint Traits

24. Enhancing the Hardware Pipelining Optimization Technique of the SHA-3 via FPGA.

28. Image Hashing Based on SHA-3 Implemented on FPGA

29. Single-Trace Fragment Template Attack on a 32-Bit Implementation of Keccak

30. Data Security in Cloud Computing Using a Hybrid Algorithm Approach

32. Two-Stage Pipelining Implementation of the Secure Hash Algorithm SHA-3 on Virtex-5 and Virtex-6 FPGAs

33. Improvement in SHA-3 Algorithm Using Different Internal Methods and Operations

34. Visually asymmetric image encryption algorithm based on SHA-3 and compressive sensing by embedding encrypted image

35. Cancellable Multi-Biometric Feature Veins Template Generation Based on SHA-3 Hashing.

36. A novel system architecture for secure authentication and data sharing in cloud enabled Big Data Environment

37. Cancellable Multi-Biometric Feature Veins Template Generation Based on SHA-3 Hashing.

38. Security and Performance Considerations of Improved Password Authentication Algorithm, Based on OTP and Hash-Chains

40. A Template Attack to Reconstruct the Input of SHA-3 on an 8-Bit Device

41. Enhancing the Hardware Pipelining Optimization Technique of the SHA-3 via FPGA

42. Visually asymmetric image encryption algorithm based on SHA-3 and compressive sensing by embedding encrypted image.

43. Upgrading Information Security and Protection for Palm-Print Templates.

44. Intra-round Pipelining of Keccak Permutation Function in FPGA Implementations

45. A Parallel GPU Implementation of SWIFFTX

46. A novel system architecture for secure authentication and data sharing in cloud enabled Big Data Environment.

47. Comparison of Hash Functions for Network Traffic Acquisition Using a Hardware-Accelerated Probe.

48. Penerapan Keamanan WSN Berbasis Algoritma RSA 2048 dan SHA-3 pada Pemantauan Suhu

49. An SHA-3 Hardware Architecture against Failures Based on Hamming Codes and Triple Modular Redundancy.

50. High-performance FPGA implementation of the secure hash algorithm 3 for single and multi-message processing.

Catalog

Books, media, physical & digital resources