|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 39 occurrences of 26 keywords
|
|
|
Results
Found 124 publication records. Showing 124 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
242 | Somitra Kumar Sanadhya, Palash Sarkar 0001 |
New Collision Attacks against Up to 24-Step SHA-2. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2008, 9th International Conference on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedings, pp. 91-103, 2008, Springer, 978-3-540-89753-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
SHA-2 hash family, reduced round attacks, Cryptanalysis |
205 | Somitra Kumar Sanadhya, Palash Sarkar 0001 |
Non-linear Reduced Round Attacks against SHA-2 Hash Family. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008, Proceedings, pp. 254-266, 2008, Springer, 978-3-540-69971-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
198 | Hirotaka Yoshida, Alex Biryukov |
Analysis of a SHA-256 Variant. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography, 12th International Workshop, SAC 2005, Kingston, ON, Canada, August 11-12, 2005, Revised Selected Papers, pp. 245-260, 2005, Springer, 3-540-33108-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
SHA-2-XOR, SHACAL-2-XOR, Pseudo-collision resistance, Iterative patterns, Differential cryptanalysis, SHA-256 |
181 | Pinakpani Pal, Palash Sarkar 0001 |
PARSHA-256- - A New Parallelizable Hash Function and a Multithreaded Implementation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 10th International Workshop, FSE 2003, Lund, Sweden, February 24-26, 2003, Revised Papers, pp. 347-361, 2003, Springer, 3-540-20449-0. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
parallel algorithm, hash function, binary tree, SHA-256 |
144 | Hongbo Yu, Xiaoyun Wang 0001 |
Distinguishing Attack on the Secret-Prefix MAC Based on the 39-Step SHA-256. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 14th Australasian Conference, ACISP 2009, Brisbane, Australia, July 1-3, 2009, Proceedings, pp. 185-201, 2009, Springer, 978-3-642-02619-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
MAC, distinguishing attack, SHA-256 |
138 | Takanori Isobe 0001, Kyoji Shibutani |
Preimage Attacks on Reduced Tiger and SHA-2. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 16th International Workshop, FSE 2009, Leuven, Belgium, February 22-25, 2009, Revised Selected Papers, pp. 139-155, 2009, Springer, 978-3-642-03316-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
SHA-512, hash function, preimage attack, second preimage attack, meet-in-the-middle, SHA-256, Tiger |
138 | Ivica Nikolic, Alex Biryukov |
Collisions for Step-Reduced SHA-256. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers, pp. 1-15, 2008, Springer, 978-3-540-71038-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
133 | Somitra Kumar Sanadhya, Palash Sarkar 0001 |
Attacking Reduced Round SHA-256. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008. Proceedings, pp. 130-143, 2008, 978-3-540-68913-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
130 | Florian Mendel, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen |
Analysis of Step-Reduced SHA-256. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 13th International Workshop, FSE 2006, Graz, Austria, March 15-17, 2006, Revised Selected Papers, pp. 126-143, 2006, Springer, 3-540-36597-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
127 | Kazumaro Aoki, Jian Guo 0001, Krystian Matusiewicz, Yu Sasaki, Lei Wang 0031 |
Preimages for Step-Reduced SHA-2. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings, pp. 578-597, 2009, Springer, 978-3-642-10365-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
SHA-512, hash, preimage attack, meet-in-the-middle, SHA-256 |
114 | Marko Hölbl, Christian Rechberger, Tatjana Welzer |
Searching for Messages Conforming to Arbitrary Sets of Conditions in SHA-256. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WEWoRC ![In: Research in Cryptology, Second Western European Workshop, WEWoRC 2007, Bochum, Germany, July 4-6, 2007, Revised Selected Papers, pp. 28-38, 2007, Springer, 978-3-540-88352-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
differential collision search, hash function, conditions, SHA-256 |
96 | Somitra Kumar Sanadhya, Palash Sarkar 0001 |
Deterministic Constructions of 21-Step Collisions for the SHA-2 Hash Family. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings, pp. 244-259, 2008, Springer, 978-3-540-85884-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
SHA-2 family, reduced round attacks, cryptanalysis |
91 | Hidenori Kuwakado, Shoichi Hirose |
Pseudorandom-Function Property of the Step-Reduced Compression Functions of SHA-256 and SHA-512. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications, 9th International Workshop, WISA 2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected Papers, pp. 174-189, 2008, Springer, 978-3-642-00305-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
89 | Akashi Satoh |
ASIC hardware implementations for 512-bit hash function Whirlpool. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCAS ![In: International Symposium on Circuits and Systems (ISCAS 2008), 18-21 May 2008, Sheraton Seattle Hotel, Seattle, Washington, USA, pp. 2917-2920, 2008, IEEE, 978-1-4244-1683-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
83 | Deukjo Hong, Donghoon Chang, Jaechul Sung, Sangjin Lee 0002, Seokhie Hong, Jaesang Lee 0002, Dukjae Moon, Sungtaek Chee |
A New Dedicated 256-Bit Hash Function: FORK-256. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 13th International Workshop, FSE 2006, Graz, Austria, March 15-17, 2006, Revised Selected Papers, pp. 195-209, 2006, Springer, 3-540-36597-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
256-bit Hash Function, FORK-256 |
81 | Magnus Nyström |
Identifiers and Test Vectors for HMAC-SHA-224, HMAC-SHA-256, HMAC-SHA-384, and HMAC-SHA-512. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 4231, pp. 1-9, December 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
79 | Kurt K. Ting, Steve C. L. Yuen, Kin-Hong Lee, Philip Heng Wai Leong |
An FPGA Based SHA-256 Processor. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FPL ![In: Field-Programmable Logic and Applications, Reconfigurable Computing Is Going Mainstream, 12th International Conference, FPL 2002, Montpellier, France, September 2-4, 2002, Proceedings, pp. 577-585, 2002, Springer, 3-540-44108-5. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
74 | Henri Gilbert, Helena Handschuh |
Security Analysis of SHA-256 and Sisters. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography, 10th Annual International Workshop, SAC 2003, Ottawa, Canada, August 14-15, 2003, Revised Papers, pp. 175-193, 2003, Springer, 3-540-21370-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
74 | Yong Ki Lee, Herwin Chan, Ingrid Verbauwhede |
Iteration Bound Analysis and Throughput Optimum Architecture of SHA-256 (384, 512) for Hardware Implementations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications, 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers, pp. 102-114, 2007, Springer, 978-3-540-77534-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
SHA-256 (384,512), Iteration Bound Analysis, Throughput Optimum Architecture |
71 | Mooseop Kim, Jaecheol Ryou 0001, Sungik Jun |
Efficient Hardware Architecture of SHA-256 Algorithm for Trusted Mobile Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inscrypt ![In: Information Security and Cryptology, 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers, pp. 240-252, 2008, Springer, 978-3-642-01439-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
65 | Shay Gueron |
Speeding Up SHA-1, SHA-256 and SHA-512 on the 2nd Generation Intel® Core™ Processors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITNG ![In: Ninth International Conference on Information Technology: New Generations, ITNG 2012, Las Vegas, Nevada, USA, 16-18 April, 2012, pp. 824-826, 2012, IEEE Computer Society, 978-0-7695-4654-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
65 | Scott G. Kelly, Sheila Frankel |
Using HMAC-SHA-256, HMAC-SHA-384, and HMAC-SHA-512 with IPsec. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 4868, pp. 1-21, May 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
64 | Hongbo Yu, Yonglin Hao, Dongxia Bai |
Evaluate the security margins of SHA-512, SHA-256 and DHA-256 against the boomerang attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sci. China Inf. Sci. ![In: Sci. China Inf. Sci. 59(5), pp. 052110:1-052110:14, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
64 | Tony Hansen |
SCRAM-SHA-256 and SCRAM-SHA-256-PLUS Simple Authentication and Security Layer (SASL) Mechanisms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 7677, pp. 1-8, November 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
62 | Akashi Satoh, Tadanobu Inoue |
ASIC-Hardware-Focused Comparison for Hash Functions MD5, RIPEMD-160, and SHS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITCC (1) ![In: International Symposium on Information Technology: Coding and Computing (ITCC 2005), Volume 1, 4-6 April 2005, Las Vegas, Nevada, USA, pp. 532-537, 2005, IEEE Computer Society, 0-7695-2315-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
62 | Jin Zhi, Chung-Horng Lung, Xia Xu, Anand Srinivasan, Yi Lei |
Securing RSVP and RSVP-TE signaling protocols and their performance study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITRE ![In: ITRE 2005 - 3rd International Conference on Information Technology: Research and Education, June 27-30 2005, Hsinchu, Taiwan, Proceedings, pp. 90-94, 2005, IEEE, 0-7803-8933-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
62 | Junko Nakajima, Mitsuru Matsui |
Performance Analysis and Parallel Implementation of Dedicated Hash Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28 - May 2, 2002, Proceedings, pp. 165-180, 2002, Springer, 3-540-43553-0. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
dedicated hash functions, Pentium III, parallel implementations |
52 | Luigi Dadda, Marco Macchetti, Jeff Owen |
The Design of a High Speed ASIC Unit for the Hash Function SHA-256 (384, 512). ![Search on Bibsonomy](Pics/bibsonomy.png) |
DATE ![In: 2004 Design, Automation and Test in Europe Conference and Exposition (DATE 2004), 16-20 February 2004, Paris, France, pp. 70-75, 2004, IEEE Computer Society, 0-7695-2085-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
52 | Luigi Dadda, Marco Macchetti, Jeff Owen |
An ASIC design for a high speed implementation of the hash function SHA-256 (384, 512). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Great Lakes Symposium on VLSI ![In: Proceedings of the 14th ACM Great Lakes Symposium on VLSI 2004, Boston, MA, USA, April 26-28, 2004, pp. 421-425, 2004, ACM, 1-58113-853-9. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
secure hash standard, hash function, data authentication |
50 | Lars R. Knudsen |
SMASH - A Cryptographic Hash Function. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption: 12th International Workshop, FSE 2005, Paris, France, February 21-23, 2005, Revised Selected Papers, pp. 228-242, 2005, Springer, 3-540-26541-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
48 | Akinori Hosoyamada, Yu Sasaki |
Quantum Collision Attacks on Reduced SHA-256 and SHA-512. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2021, pp. 292, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
48 | Akinori Hosoyamada, Yu Sasaki |
Quantum Collision Attacks on Reduced SHA-256 and SHA-512. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO (1) ![In: Advances in Cryptology - CRYPTO 2021 - 41st Annual International Cryptology Conference, CRYPTO 2021, Virtual Event, August 16-20, 2021, Proceedings, Part I, pp. 616-646, 2021, Springer, 978-3-030-84241-3. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
48 | Denis Bider |
Use of RSA Keys with SHA-256 and SHA-512 in the Secure Shell (SSH) Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 8332, pp. 1-9, March 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
48 | Harris E. Michail, Georgios Athanasiou, George Theodoridis, Andreas Gregoriades, Costas E. Goutis |
Design and implementation of totally-self checking SHA-1 and SHA-256 hash functions' architectures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Microprocess. Microsystems ![In: Microprocess. Microsystems 45, pp. 227-240, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
48 | Harris E. Michail, George Athanasiou, Vasilios I. Kelefouras, George Theodoridis, Thanos Stouraitis, Costas E. Goutis |
Area-Throughput Trade-Offs for SHA-1 and SHA-256 Hash Functions' Pipelined Designs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Circuits Syst. Comput. ![In: J. Circuits Syst. Comput. 25(4), pp. 1650032:1-1650032:26, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
48 | Mooseop Kim, Deok-Gyu Lee, Jaecheol Ryou 0001 |
Compact and unified hardware architecture for SHA-1 and SHA-256 of trusted mobile computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Pers. Ubiquitous Comput. ![In: Pers. Ubiquitous Comput. 17(5), pp. 921-932, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
48 | Jun-Cheol Jeon, Kang-Joong Seo, Kee-Won Kim |
Hardware complexity of SHA-1 and SHA-256 based on area and time analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICOIN ![In: 2012 International Conference on Information Networking, ICOIN 2012, Bali, Indonesia, February 1-3, 2012, pp. 557-561, 2012, IEEE Computer Society, 978-1-4673-0251-7. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
48 | Yu Sasaki, Lei Wang 0031, Kazumaro Aoki |
Preimage Attacks on 41-Step SHA-256 and 46-Step SHA-512. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2009, pp. 479, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
48 | Imtiaz Ahmad, A. Shoba Das |
Hardware implementation analysis of SHA-256 and SHA-512 algorithms on FPGAs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Electr. Eng. ![In: Comput. Electr. Eng. 31(6), pp. 345-360, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
48 | |
A Presentation on VEST Hardware Performance, Chip Area Measurements, Power Consumption Estimates and Benchmarking in Relation to the AES, SHA-256 and SHA-512. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2005, pp. 415, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
48 | Hachem Bensalem, Yves Blaquière, Yvon Savaria |
Acceleration of the Secure Hash Algorithm-256 (SHA-256) on an FPGA-CPU Cluster Using OpenCL. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCAS ![In: IEEE International Symposium on Circuits and Systems, ISCAS 2021, Daegu, South Korea, May 22-28, 2021, pp. 1-5, 2021, IEEE, 978-1-7281-9201-7. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
48 | Fatma Kahri, Hassen Mestiri, Belgacem Bouallegue, Mohsen Machhout |
Efficient FPGA hardware implementation of secure hash function SHA-256/Blake-256. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSD ![In: 12th IEEE International Multi-Conference on Systems, Signals & Devices, SSD 2015, Mahdia, Tunisia, March 16-19, 2015, pp. 1-5, 2015, IEEE, 978-1-4799-1758-7. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
42 | Robert P. McEvoy, Francis M. Crowe, Colin C. Murphy, William P. Marnane |
Optimisation of the SHA-2 Family of Hash Functions on FPGAs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISVLSI ![In: 2006 IEEE Computer Society Annual Symposium on VLSI (ISVLSI 2006), 2-3 March 2006, Karlsruhe, Germany, pp. 317-322, 2006, IEEE Computer Society, 0-7695-2533-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
42 | Martin Feldhofer, Christian Rechberger |
A Case Against Currently Used Hash Functions in RFID Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OTM Workshops (1) ![In: On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, OTM Confederated International Workshops and Posters, AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET, OnToContent, ORM, PerSys, OTM Academy Doctoral Consortium, RDDS, SWWS, and SeBGIS 2006, Montpellier, France, October 29 - November 3, 2006. Proceedings, Part I, pp. 372-381, 2006, Springer, 3-540-48269-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
32 | B. Rahul, K. Kuppusamy, A. Senthilrajan |
Bio-Metric Based Colour-Image-Encryption using Multi-Chaotic Dynamical Systems and SHA-256 Hash Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Secur. J. A Glob. Perspect. ![In: Inf. Secur. J. A Glob. Perspect. 33(3), pp. 226-250, May 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
32 | Lucas Daudt Franck, Gabriel Augusto Ginja, João Paulo Carmo, José A. Afonso 0001, Maximiliam Luppe |
Custom ASIC Design for SHA-256 Using Open-Source Tools. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. ![In: Comput. 13(1), pp. 9, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
32 | Ahmet Orun, Fatih Kurugollu |
The lower energy consumption in cryptocurrency mining processes by SHA-256 Quantum circuit design used in hybrid computing domains. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2401.10902, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
32 | Jongheon Lee, Sokjoon Lee, You-Seok Lee, Dooho Choi |
T-depth reduction method for efficient SHA-256 quantum circuit construction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IET Inf. Secur. ![In: IET Inf. Secur. 17(1), pp. 46-65, January 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
32 | Ziheng Wang 0002, Xiaoshe Dong, Yan Kang 0005, Heng Chen 0002 |
Parallel SHA-256 on SW26010 many-core processor for hashing of multiple messages. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Supercomput. ![In: J. Supercomput. 79(2), pp. 2332-2355, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
32 | B. Rahul, K. Kuppusamy, A. Senthilrajan |
Chaos-based audio encryption algorithm using biometric image and SHA-256 hash algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multim. Tools Appl. ![In: Multim. Tools Appl. 82(28), pp. 43729-43758, November 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
32 | Junfeng Wu, Jialu Zhang, Dong Liu, Xiaofeng Wang |
A Multiple-Medical-Image Encryption Method Based on SHA-256 and DNA Encoding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Entropy ![In: Entropy 25(6), pp. 898, June 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
32 | Yingxin Li, Fukang Liu, Gaoli Wang |
New Records in Collision Attacks on RIPEMD-160 and SHA-256. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2023, pp. 285, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
32 | Andrey Plotnikov, Alla Levina |
Algorithm for simplifying the SHA-256 operations tree. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSR ![In: IEEE International Conference on Cyber Security and Resilience, CSR 2023, Venice, Italy, July 31 - Aug. 2, 2023, pp. 592-597, 2023, IEEE, 979-8-3503-1170-9. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
32 | Mohammed Alkhyeli, Shaheen Alkhyeli, Khalifa Aldhaheri, Hanane Lamaazi |
Secure Chat Room Application Using AES-GCM Encryption and SHA-256. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IIT ![In: 15th International Conference on Innovations in Information Technology, IIT 2023, Al Ain, United Arab Emirates, November 14-15, 2023, pp. 180-185, 2023, IEEE, 979-8-3503-8239-6. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
32 | Xiyu Sun, Zhong Chen |
A Novel Chaotic Image Encryption Algorithm Based on Coordinate Descent and SHA-256. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 10, pp. 114597-114611, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
32 | Rajiv Ranjan Suman, Bhaskar Mondal, Tarni Mandal |
A secure encryption scheme using a Composite Logistic Sine Map (CLSM) and SHA-256. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multim. Tools Appl. ![In: Multim. Tools Appl. 81(19), pp. 27089-27110, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
32 | Ray A. Perlner, John Kelsey, David A. Cooper |
Breaking Category Five SPHINCS+ with SHA-256. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2022, pp. 1061, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
32 | Ignacio Algredo-Badillo, Miguel Morales-Sandoval, Alejandro Medina-Santiago, Carlos Arturo Hernández-Gracidas, Mariana Lobato Báez, Luis Alberto Morales-Rosales |
A SHA-256 Hybrid-Redundancy Hardware Architecture for Detecting and Correcting Errors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sensors ![In: Sensors 22(13), pp. 5028, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
32 | Ray A. Perlner, John Kelsey, David A. Cooper |
Breaking Category Five SPHINCS+ with SHA-256. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PQCrypto ![In: Post-Quantum Cryptography - 13th International Workshop, PQCrypto 2022, Virtual Event, September 28-30, 2022, Proceedings, pp. 501-522, 2022, Springer, 978-3-031-17233-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
32 | Bharat S. Rawal, Lingampally Shiva Kumar, Sriram Maganti, Varun Godha |
Comparative Study of Sha-256 Optimization Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AIIoT ![In: 2022 IEEE World AI IoT Congress (AIIoT), Seattle, WA, USA, June 6-9, 2022, pp. 387-392, 2022, IEEE, 978-1-6654-8453-4. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
32 | Reza Fotohi, Fereidoon Shams Aliee |
Securing communication between things using blockchain technology based on authentication and SHA-256 to improving scalability in large-scale IoT. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Networks ![In: Comput. Networks 197, pp. 108331, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
32 | Juan Wang, Ge Liu, Yongqi Chen, Shu Wang |
Construction and Analysis of SHA-256 Compression Function Based on Chaos S-Box. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 9, pp. 61768-61777, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
32 | Thi Hong Tran, Hoai Luan Pham, Yasuhiko Nakashima |
A High-Performance Multimem SHA-256 Accelerator for Society 5.0. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 9, pp. 39182-39192, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
32 | Reena Maharjan, Abeer Alsadoon, P. W. C. Prasad, Nabil Giweli, Omar Hisham Alsadoon |
A novel secure solution of using mixed reality in data transmission for bowel and jaw surgical training: markov property using SHA 256. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multim. Tools Appl. ![In: Multim. Tools Appl. 80(12), pp. 18917-18939, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
32 | Kirtee Panwar, Ravindra Kumar Purwar, Garima Srivastava |
A Fast Encryption Scheme Suitable for Video Surveillance Applications Using SHA-256 Hash Function and 1D Sine-Sine Chaotic Map. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Image Graph. ![In: Int. J. Image Graph. 21(2), pp. 2150022:1-2150022:25, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
32 | Kazuki Nakamura, Koji Hori, Shoichi Hirose |
Algebraic Fault Analysis of SHA-256 Compression Function and Its Application. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. ![In: Inf. 12(10), pp. 433, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
32 | Mellila Bouam, Charles Bouillaguet, Claire Delaplace, Camille Noûs |
Computational records with aging hardware: Controlling half the output of SHA-256. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Parallel Comput. ![In: Parallel Comput. 106, pp. 102804, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
32 | Mellila Bouam, Charles Bouillaguet, Claire Delaplace, Camille Noûs |
Computational Records with Aging Hardware: Controlling Half the Output of SHA-256. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2021, pp. 886, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
32 | Van Dai Phan, Hoai Luan Pham, Thi Hong Tran, Yasuhiko Nakashima |
High Performance Multicore SHA-256 Accelerator using Fully Parallel Computation and Local Memory. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COOL CHIPS ![In: IEEE Symposium in Low-Power and High-Speed Chips, COOL CHIPS 2021, Tokyo, Japan, April 14-16, 2021, pp. 1-3, 2021, IEEE, 978-1-6654-1503-3. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
32 | Jongheon Lee, Sokjoon Lee, You-Seok Lee, Dooho Choi |
T-depth Reduction Method for Efficient SHA-256 Quantum Circuit Construction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2021 - 24th International Conference, Seoul, South Korea, December 1-3, 2021, Revised Selected Papers, pp. 379-402, 2021, Springer, 978-3-031-08895-7. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
32 | Raffaele Martino, Alessandro Cilardo |
Designing a SHA-256 processor for blockchain-based IoT applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Internet Things ![In: Internet Things 11, pp. 100254, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
32 | Hoai Luan Pham, Thi Hong Tran, Tri Dung Phan, Vu Trung Duong Le, Duc Khai Lam, Yasuhiko Nakashima |
Double SHA-256 Hardware Architecture With Compact Message Expander for Bitcoin Mining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 8, pp. 139634-139646, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
32 | Ruizhen Wu, Xiaoyong Zhang, Mingming Wang, Lin Wang |
A High-Performance Parallel Hardware Architecture of SHA-256 Hash in ASIC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICACT ![In: 22nd International Conference on Advanced Communication Technology, ICACT 2020, Phoenix Park, PyeongChang, Korea (South), February 16-19, 2020, pp. 1242-1247, 2020, IEEE, 979-11-88428-04-5. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
32 | Ali H. Gad, Seif Eldeen E. Abdalazeem, Omar A. Abdelmegid, Hassan Mostafa |
Low power and area SHA-256 hardware accelerator on Virtex-7 FPGA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NILES ![In: 2nd Novel Intelligent and Leading Emerging Sciences Conference, NILES 2020, Giza, Egypt, October 24-26, 2020, pp. 181-185, 2020, IEEE, 978-1-7281-8226-1. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
32 | Yimeng Chen, Shuguo Li |
A High-Throughput Hardware Implementation of SHA-256 Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCAS ![In: IEEE International Symposium on Circuits and Systems, ISCAS 2020, Sevilla, Spain, October 10-21, 2020, pp. 1-4, 2020, IEEE, 978-1-7281-3320-1. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
32 | Imed Ben Dhaou, Hannu Tenhunen |
A High-Throughput Architecture for the SHA-256/224 Compliant With the DSRC Standard. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Embed. Real Time Commun. Syst. ![In: Int. J. Embed. Real Time Commun. Syst. 10(1), pp. 98-118, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
32 | Raffaele Martino, Alessandro Cilardo |
A Configurable Implementation of the SHA-256 Hash Function. ![Search on Bibsonomy](Pics/bibsonomy.png) |
3PGCIC ![In: Advances on P2P, Parallel, Grid, Cloud and Internet Computing - Proceedings of the 14th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, 3PGCIC-2019, Antwerp, Belgium, November 7-9, 2019., pp. 558-567, 2019, Springer, 978-3-030-33508-3. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
32 | Xiaoyong Zhang, Ruizhen Wu, Mingming Wang, Lin Wang |
A High-Performance Parallel Computation Hardware Architecture in ASIC of SHA-256 Hash. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICACT ![In: 21st International Conference on Advanced Communication Technology, ICACT 2019, Pyeongchang, South Korea, February 17-20, 2019, pp. 52-55, 2019, IEEE, 979-11-88428-02-1. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
32 | Junshang Li, Zishang He, Yajie Qin |
Design of Asynchronous High Throughput SHA-256 Hardware Accelerator in 40nm CMOS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASICON ![In: 13th IEEE International Conference on ASIC, ASICON 2019, Chongqing, China, October 29 - November 1, 2019, pp. 1-4, 2019, IEEE, 978-1-7281-0735-6. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
32 | Artur Hlobaz |
Statistical Analysis of Enhanced SDEx Encryption Method Based on SHA-256 Hash Function. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LCN ![In: 44th IEEE Conference on Local Computer Networks, LCN 2019, Osnabrueck, Germany, October 14-17, 2019, pp. 238-241, 2019, IEEE, 978-1-7281-1028-8. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
32 | Argirios Sideris, Theodora Sanida, Minas Dasygenis |
Hardware Acceleration of SHA-256 Algorithm Using NIOS-II Processor. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MOCAST ![In: 8th International Conference on Modern Circuits and Systems Technologies, MOCAST 2019, Thessaloniki, Greece, May 13-15, 2019, pp. 1-4, 2019, IEEE, 978-1-7281-1184-1. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
32 | Daisuke Oku, Masao Yanagisawa, Nozomu Togawa |
Scan-based Side-channel Attack against HMAC-SHA-256 Circuits Based on Isolating Bit-transition Groups Using Scan Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPSJ Trans. Syst. LSI Des. Methodol. ![In: IPSJ Trans. Syst. LSI Des. Methodol. 11, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
32 | Shuqin Zhu, Congxu Zhu, Wenhong Wang |
A New Image Encryption Algorithm Based on Chaos and Secure Hash SHA-256. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Entropy ![In: Entropy 20(9), pp. 716, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
32 | Ming Ming Wong, Vikramkumar Pudi, Anupam Chattopadhyay |
Lightweight and High Performance SHA-256 using Architectural Folding and 4-2 Adder Compressor. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VLSI-SoC ![In: IFIP/IEEE International Conference on Very Large Scale Integration, VLSI-SoC 2018, Verona, Italy, October 8-10, 2018, pp. 95-100, 2018, IEEE, 978-1-5386-4756-1. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
32 | Daisuke Oku, Masao Yanagisawa, Nozomu Togawa |
A robust scan-based side-channel attack method against HMAC-SHA-256 circuits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCE-Berlin ![In: 7th IEEE International Conference on Consumer Electronics - Berlin, ICCE-Berlin 2017, Berlin, Germany, September 3-6, 2017, pp. 79-84, 2017, IEEE, 978-1-5090-4014-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
32 | Meelu Padhi, Ravindra Chaudhari |
An optimized pipelined architecture of SHA-256 hash function. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISED ![In: 7th International Symposium on Embedded Computing and System Design, ISED 2017, Durgapur, India, December 18-20, 2017, pp. 1-4, 2017, IEEE, 978-1-5386-3032-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
32 | Marek Sýs, Dusan Klinec, Karel Kubicek 0001, Petr Svenda |
BoolTest: The Fast Randomness Testing Strategy Based on Boolean Functions with Application to DES, 3-DES, MD5, MD6 and SHA-256. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICETE (Selected Papers) ![In: E-Business and Telecommunications - 14th International Joint Conference, ICETE 2017, Madrid, Spain, July 24-26, 2017, Revised Selected Paper, pp. 123-149, 2017, Springer, 978-3-030-11038-3. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
32 | Aqeel-ur Rehman, Xiaofeng Liao 0001, Ayesha Kulsoom, Sami Ullah |
A modified (Dual) fusion technique for image encryption using SHA-256 hash and multiple chaotic maps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multim. Tools Appl. ![In: Multim. Tools Appl. 75(18), pp. 11241-11266, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
32 | Michael Hutter |
Threshold Implementations in Industry: A Case Study on SHA-256. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TIS@CCS ![In: Proceedings of the ACM Workshop on Theory of Implementation Security, TIS@CCS 2016 Vienna, Austria, October, 2016, pp. 37, 2016, ACM, 978-1-4503-4575-0. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
32 | William L. Harrison, Adam M. Procter, Gerard Allwein |
Model-driven design & synthesis of the SHA-256 cryptographic hash function in rewire. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RSP ![In: 2016 International Symposium on Rapid System Prototyping, RSP 2016, Pittsburg, PA, USA, October 6-7, 2016, pp. 114-120, 2016, IEEE, 978-1-4503-4535-4. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
32 | Florian Mendel, Tomislav Nad, Martin Schläffer |
Improving Local Collisions: New Attacks on Reduced SHA-256. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2015, pp. 350, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
32 | Andrew W. Appel |
Verification of a Cryptographic Primitive: SHA-256. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Program. Lang. Syst. ![In: ACM Trans. Program. Lang. Syst. 37(2), pp. 7:1-7:31, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
32 | Harris E. Michail, Apostolis Kotsiolis, Athanasios Kakarountas, George Athanasiou, Costas E. Goutis |
Hardware implementation of the Totally Self-Checking SHA-256 hash core. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCON ![In: IEEE EUROCON 2015 - International Conference on Computer as a Tool, Salamanca, Spain, September 8-11, 2015, pp. 1-5, 2015, IEEE, 978-1-4799-8569-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
32 | Andrew W. Appel |
Verification of a cryptographic primitive: SHA-256 (abstract). ![Search on Bibsonomy](Pics/bibsonomy.png) |
PLDI ![In: Proceedings of the 36th ACM SIGPLAN Conference on Programming Language Design and Implementation, Portland, OR, USA, June 15-17, 2015, pp. 153, 2015, ACM, 978-1-4503-3468-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
32 | Rommel García, Ignacio Algredo-Badillo, Miguel Morales-Sandoval, Claudia Feregrino Uribe, René Cumplido |
A compact FPGA-based processor for the Secure Hash Algorithm SHA-256. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Electr. Eng. ![In: Comput. Electr. Eng. 40(1), pp. 194-202, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
32 | Shay Gueron |
Parallelized hashing via j-lanes and j-pointers tree modes, with applications to SHA-256. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2014, pp. 170, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
32 | Chu-Hsing Lin, Chen-Yu Lee, Krishna M. Kavi, Deng-Jyi Chen, Yi-Shiung Yeh |
Finding Near-Optimum Message Scheduling Settings for SHA-256 Variants Using Genetic Algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Sci. Eng. ![In: J. Inf. Sci. Eng. 29(5), pp. 889-905, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP BibTeX RDF |
|
32 | Ignacio Algredo-Badillo, Claudia Feregrino Uribe, René Cumplido, Miguel Morales-Sandoval |
FPGA-based implementation alternatives for the inner loop of the Secure Hash Algorithm SHA-256. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Microprocess. Microsystems ![In: Microprocess. Microsystems 37(6-7), pp. 750-757, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
32 | Jan A. Bergstra, Cornelis A. Middelburg |
Instruction sequence expressions for the secure hash algorithm SHA-256. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1308.0219, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP BibTeX RDF |
|
32 | Florian Mendel, Tomislav Nad, Martin Schläffer |
Improving Local Collisions: New Attacks on Reduced SHA-256. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings, pp. 262-278, 2013, Springer, 978-3-642-38347-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 124 (100 per page; Change: ) Pages: [ 1][ 2][ >>] |
|