X
Search Filters
Format Format
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
sha-2 (58) 58
cryptography (22) 22
sha-1 (15) 15
security (12) 12
fpga (10) 10
hardware (10) 10
hash functions (10) 10
encryption (9) 9
algorithm design and analysis (8) 8
algorithms (8) 8
cryptanalysis (8) 8
field programmable gate arrays (8) 8
hash function (8) 8
sha-3 (8) 8
data encryption (7) 7
computer science (6) 6
hmac (6) 6
nist (6) 6
throughput (6) 6
authentication (5) 5
computer architecture (5) 5
computer science, information systems (5) 5
computer science, theory & methods (5) 5
digital signatures (5) 5
engineering, electrical & electronic (5) 5
entropy (5) 5
md5 (5) 5
standards (5) 5
blake (4) 4
cloud computing (4) 4
computer science, hardware & architecture (4) 4
hardware implementation (4) 4
image encryption (4) 4
internet (4) 4
message authentication (4) 4
registers (4) 4
sha-512 (4) 4
94a60 (3) 3
algorithm analysis and problem complexity (3) 3
analysis (3) 3
blockchain (3) 3
chaos theory (3) 3
ciphers (3) 3
clocks (3) 3
collisions (3) 3
computer science, software engineering (3) 3
differential power analysis (3) 3
discrete mathematics in computer science (3) 3
dna (3) 3
hamming weight (3) 3
hash function standard (3) 3
hash-funktion (3) 3
mathematics (3) 3
permutation (3) 3
preimage attack (3) 3
random number generator (3) 3
random sequences (3) 3
reduced round attacks (3) 3
secure hash algorithm (3) 3
sha-2 family (3) 3
sha-256 (3) 3
side channel analysis (3) 3
systems and data security (3) 3
telecommunications (3) 3
thermal noise (3) 3
verschlüsselung (3) 3
accelerators (2) 2
aes (2) 2
algorithm (2) 2
authentifizierung (2) 2
bitcoin (2) 2
blue midnight wish (2) 2
bmw-256 (2) 2
classification (2) 2
classification algorithms (2) 2
combinatorics (2) 2
complexity (2) 2
computation (2) 2
computer communication networks (2) 2
computer science, interdisciplinary applications (2) 2
computer security (2) 2
computer simulation (2) 2
computers (2) 2
confusion (2) 2
cryptographic hash function (2) 2
cryptosystem (2) 2
custom instruction (2) 2
deduplication (2) 2
deoxyribonucleic acid--dna (2) 2
diffusion (2) 2
dna sequencing (2) 2
dsa (2) 2
ecc (2) 2
hash (2) 2
hash based algorithms (2) 2
hw/sw partitioning (2) 2
implementation (2) 2
information security (2) 2
initial structure (2) 2
lorenz system (2) 2
more...
Language Language
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


Nonlinear Dynamics, ISSN 0924-090X, 2/2016, Volume 83, Issue 3, pp. 1123 - 1136
Journal Article
International Journal of Bifurcation and Chaos, ISSN 0218-1274, 02/2019, Volume 29, Issue 2, p. 1950016
In this paper, to avoid chosen-plaintext attacks and to enhance the security, SHA-256 hash value of the plain image is introduced to produce the initial values... 
SYSTEM | Image encryption | SHA-2 | MATHEMATICS, INTERDISCIPLINARY APPLICATIONS | DNA-SEQUENCE OPERATION | MULTIDISCIPLINARY SCIENCES | Feistel network | PERMUTATION | chaotic system
Journal Article
Journal of Physics: Conference Series, ISSN 1742-6588, 05/2018, Volume 1003, Issue 1
Conference Proceeding
Annales des Telecommunications/Annals of Telecommunications, ISSN 0003-4347, 06/2017, Volume 72, Issue 5-6, pp. 335 - 345
The newly emerged Software-Defined Systems (SDSs) promised to reduce computing systems management complexity. This can be achieved by separating the control... 
SHA-2 | Software-defined system | Efficient Confidentiality-based Cloud Storage Framework (ECCSF) | TELECOMMUNICATIONS | INTERNET | CONTEXT | Access control | Computer organization | Cloud computing | Data security
Journal Article
International Journal of Modern Physics C, ISSN 0129-1831, 07/2018, Volume 29, Issue 7, p. 1850058
In this paper, an efficient scheme for image encryption based on the nested chaotic map and deoxyribonucleic acid (DNA) is introduced. In order to generate the... 
diffusion | SHA-2 | Image encryption scheme | nested chaotic map | Julia's fractal process | confusion | DNA sequence operations | COMPRESSION | PERMUTATION | MODEL | PHYSICS, MATHEMATICAL | COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS | OPERATION | MAP | Investment analysis | Algorithms | Nucleotide sequence | Analysis | DNA | Nucleotide sequencing | DNA sequencing
Journal Article
Quantum Information Processing, ISSN 1570-0755, 12/2018, Volume 17, Issue 12, pp. 1 - 39
Journal Article
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2013, Volume 7881, pp. 262 - 278
Conference Proceeding
Computers in Biology and Medicine, ISSN 0010-4825, 2013, Volume 45, Issue 1, pp. 111 - 117
Journal Article
Designs, Codes and Cryptography, ISSN 0925-1022, 9/2016, Volume 80, Issue 3, pp. 587 - 618
Journal Article
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2016, Volume 9610, pp. 397 - 412
Conference Proceeding
The Journal of Supercomputing, ISSN 0920-8542, 3/2005, Volume 31, Issue 3, pp. 227 - 248
Journal Article
Journal of Circuits, Systems and Computers, ISSN 0218-1266, 07/2013, Volume 22, Issue 6
Hash functions are among the crucial modules of modern hardware cryptographic systems. These systems frequently operate in harsh and noisy environments where... 
Hash functions | Totally self-checking | Error detection | SHA-2 | SHA-1 | Cryptography | DESIGN | COMPUTER SCIENCE, HARDWARE & ARCHITECTURE | CONCURRENT ERROR-DETECTION | totally self-checking | hash functions | ALGORITHMS | error detection | ENGINEERING, ELECTRICAL & ELECTRONIC | HARDWARE IMPLEMENTATION | SIDE-CHANNEL CRYPTANALYSIS
Journal Article
Journal of Engineering and Applied Sciences, ISSN 1816-949X, 2018, Volume 13, Issue 5, pp. 1057 - 1063
Journal Article
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2006, Volume 4249, pp. 298 - 310
This paper proposes a set of new techniques to improve the implementation of the SHA-2 hashing algorithm. These techniques consist mostly in operation... 
Hash functions | SHA-2 (256, 512) | Cryptography | FPGA | cryptography | SHA-2 (256,512) | COMPUTER SCIENCE, THEORY & METHODS | hash functions
Conference Proceeding
Journal of Systems Architecture, ISSN 1383-7621, 2007, Volume 53, Issue 2, pp. 127 - 138
We propose an improved implementation of the SHA-2 hash family, with minimal operator latency and reduced hardware requirements. We also propose a high... 
SHA-2 family | Hash function | FPGA | Multi-mode operator | multi-mode operator | COMPUTER SCIENCE, SOFTWARE ENGINEERING | COMPUTER SCIENCE, HARDWARE & ARCHITECTURE | hash function | Cryptography and Security | Computer Science
Journal Article
2017 7th International Symposium on Embedded Computing and System Design (ISED), 12/2017, Volume 2018-, pp. 1 - 4
Real time applications of digital communication systems are rapidly increasing. Due to this there is a huge demand for high level of security. In cryptographic... 
pipelined | SHA-2 | FPGA | Throughput | Registers | Security | 512 | Computer architecture | Hardware | Carry skip adder | Cryptography | Field programmable gate arrays | Clocks | SHA-2(256, 512)
Conference Proceeding
Journal of the Egyptian Mathematical Society, ISSN 2090-9128, 12/2019, Volume 27, Issue 1, pp. 1 - 20
We present a new version of the Secure Hash Algorithm-2 (SHA-2) formed on artificial sequences of deoxyribonucleic acid (DNA). This article is the first... 
SHA-2 | 68P25 | 92D20 | DNA | Secure hash function | Mathematics, general | Mathematics | 94A60
Journal Article
International Journal of Advanced Computer Science and Applications, ISSN 2158-107X, 2018, Volume 9, Issue 8, pp. 98 - 103
Journal Article
IEICE Transactions on Information and Systems, ISSN 0916-8532, 2009, Volume E92-D, Issue 10, pp. 2034 - 2042
The security hash algorithm 512 (SHA-512), which is used to verify the integrity of a message, involves computational iterations on data. The huge computation... 
fine-grained pipelining | cryptography | SHA-2 | FPGA | Cryptography | Fine-grained pipelining | COMPUTER SCIENCE, SOFTWARE ENGINEERING | IMPLEMENTATION | COMPUTER SCIENCE, INFORMATION SYSTEMS | Balancing | Messages | Pipelining (computers) | Similarity | Computation | Pipelines | Hardware | Iterative methods
Journal Article
IEEE Access, ISSN 2169-3536, 2020, Volume 8, pp. 28415 - 28436
While SHA-2 is a ubiquitous cryptographic hashing primitive, its role in emerging application domains, e.g. blockchains or trusted IoT components, has made the... 
Hash functions | Accelerators | SHA-2 | INTERNET | HIGH-THROUGHPUT | ALGORITHM | COMPUTER SCIENCE, INFORMATION SYSTEMS | TELECOMMUNICATIONS | LOW-POWER | ENGINEERING, ELECTRICAL & ELECTRONIC | BITCOIN | SECURITY | ARCHITECTURE | HARDWARE IMPLEMENTATION | BLOCKCHAIN
Journal Article
No results were found for your search.

Cannot display more than 1000 results, please narrow the terms of your search.