The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase SHA-256 (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
2002-2005 (16) 2006-2008 (26) 2009-2012 (16) 2013-2016 (19) 2017-2020 (18) 2021-2022 (19) 2023-2024 (10)
Publication types (Num. hits)
article(55) inproceedings(69)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 39 occurrences of 26 keywords

Results
Found 124 publication records. Showing 124 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
242Somitra Kumar Sanadhya, Palash Sarkar 0001 New Collision Attacks against Up to 24-Step SHA-2. Search on Bibsonomy INDOCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF SHA-2 hash family, reduced round attacks, Cryptanalysis
205Somitra Kumar Sanadhya, Palash Sarkar 0001 Non-linear Reduced Round Attacks against SHA-2 Hash Family. Search on Bibsonomy ACISP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
198Hirotaka Yoshida, Alex Biryukov Analysis of a SHA-256 Variant. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF SHA-2-XOR, SHACAL-2-XOR, Pseudo-collision resistance, Iterative patterns, Differential cryptanalysis, SHA-256
181Pinakpani Pal, Palash Sarkar 0001 PARSHA-256- - A New Parallelizable Hash Function and a Multithreaded Implementation. Search on Bibsonomy FSE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF parallel algorithm, hash function, binary tree, SHA-256
144Hongbo Yu, Xiaoyun Wang 0001 Distinguishing Attack on the Secret-Prefix MAC Based on the 39-Step SHA-256. Search on Bibsonomy ACISP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF MAC, distinguishing attack, SHA-256
138Takanori Isobe 0001, Kyoji Shibutani Preimage Attacks on Reduced Tiger and SHA-2. Search on Bibsonomy FSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF SHA-512, hash function, preimage attack, second preimage attack, meet-in-the-middle, SHA-256, Tiger
138Ivica Nikolic, Alex Biryukov Collisions for Step-Reduced SHA-256. Search on Bibsonomy FSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
133Somitra Kumar Sanadhya, Palash Sarkar 0001 Attacking Reduced Round SHA-256. Search on Bibsonomy ACNS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
130Florian Mendel, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen Analysis of Step-Reduced SHA-256. Search on Bibsonomy FSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
127Kazumaro Aoki, Jian Guo 0001, Krystian Matusiewicz, Yu Sasaki, Lei Wang 0031 Preimages for Step-Reduced SHA-2. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF SHA-512, hash, preimage attack, meet-in-the-middle, SHA-256
114Marko Hölbl, Christian Rechberger, Tatjana Welzer Searching for Messages Conforming to Arbitrary Sets of Conditions in SHA-256. Search on Bibsonomy WEWoRC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF differential collision search, hash function, conditions, SHA-256
96Somitra Kumar Sanadhya, Palash Sarkar 0001 Deterministic Constructions of 21-Step Collisions for the SHA-2 Hash Family. Search on Bibsonomy ISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF SHA-2 family, reduced round attacks, cryptanalysis
91Hidenori Kuwakado, Shoichi Hirose Pseudorandom-Function Property of the Step-Reduced Compression Functions of SHA-256 and SHA-512. Search on Bibsonomy WISA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
89Akashi Satoh ASIC hardware implementations for 512-bit hash function Whirlpool. Search on Bibsonomy ISCAS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
83Deukjo Hong, Donghoon Chang, Jaechul Sung, Sangjin Lee 0002, Seokhie Hong, Jaesang Lee 0002, Dukjae Moon, Sungtaek Chee A New Dedicated 256-Bit Hash Function: FORK-256. Search on Bibsonomy FSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF 256-bit Hash Function, FORK-256
81Magnus Nyström Identifiers and Test Vectors for HMAC-SHA-224, HMAC-SHA-256, HMAC-SHA-384, and HMAC-SHA-512. Search on Bibsonomy RFC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
79Kurt K. Ting, Steve C. L. Yuen, Kin-Hong Lee, Philip Heng Wai Leong An FPGA Based SHA-256 Processor. Search on Bibsonomy FPL The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
74Henri Gilbert, Helena Handschuh Security Analysis of SHA-256 and Sisters. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
74Yong Ki Lee, Herwin Chan, Ingrid Verbauwhede Iteration Bound Analysis and Throughput Optimum Architecture of SHA-256 (384, 512) for Hardware Implementations. Search on Bibsonomy WISA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF SHA-256 (384,512), Iteration Bound Analysis, Throughput Optimum Architecture
71Mooseop Kim, Jaecheol Ryou 0001, Sungik Jun Efficient Hardware Architecture of SHA-256 Algorithm for Trusted Mobile Computing. Search on Bibsonomy Inscrypt The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
65Shay Gueron Speeding Up SHA-1, SHA-256 and SHA-512 on the 2nd Generation Intel® Core™ Processors. Search on Bibsonomy ITNG The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
65Scott G. Kelly, Sheila Frankel Using HMAC-SHA-256, HMAC-SHA-384, and HMAC-SHA-512 with IPsec. Search on Bibsonomy RFC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
64Hongbo Yu, Yonglin Hao, Dongxia Bai Evaluate the security margins of SHA-512, SHA-256 and DHA-256 against the boomerang attack. Search on Bibsonomy Sci. China Inf. Sci. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
64Tony Hansen SCRAM-SHA-256 and SCRAM-SHA-256-PLUS Simple Authentication and Security Layer (SASL) Mechanisms. Search on Bibsonomy RFC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
62Akashi Satoh, Tadanobu Inoue ASIC-Hardware-Focused Comparison for Hash Functions MD5, RIPEMD-160, and SHS. Search on Bibsonomy ITCC (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
62Jin Zhi, Chung-Horng Lung, Xia Xu, Anand Srinivasan, Yi Lei Securing RSVP and RSVP-TE signaling protocols and their performance study. Search on Bibsonomy ITRE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
62Junko Nakajima, Mitsuru Matsui Performance Analysis and Parallel Implementation of Dedicated Hash Functions. Search on Bibsonomy EUROCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF dedicated hash functions, Pentium III, parallel implementations
52Luigi Dadda, Marco Macchetti, Jeff Owen The Design of a High Speed ASIC Unit for the Hash Function SHA-256 (384, 512). Search on Bibsonomy DATE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
52Luigi Dadda, Marco Macchetti, Jeff Owen An ASIC design for a high speed implementation of the hash function SHA-256 (384, 512). Search on Bibsonomy ACM Great Lakes Symposium on VLSI The full citation details ... 2004 DBLP  DOI  BibTeX  RDF secure hash standard, hash function, data authentication
50Lars R. Knudsen SMASH - A Cryptographic Hash Function. Search on Bibsonomy FSE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
48Akinori Hosoyamada, Yu Sasaki Quantum Collision Attacks on Reduced SHA-256 and SHA-512. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2021 DBLP  BibTeX  RDF
48Akinori Hosoyamada, Yu Sasaki Quantum Collision Attacks on Reduced SHA-256 and SHA-512. Search on Bibsonomy CRYPTO (1) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
48Denis Bider Use of RSA Keys with SHA-256 and SHA-512 in the Secure Shell (SSH) Protocol. Search on Bibsonomy RFC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
48Harris E. Michail, Georgios Athanasiou, George Theodoridis, Andreas Gregoriades, Costas E. Goutis Design and implementation of totally-self checking SHA-1 and SHA-256 hash functions' architectures. Search on Bibsonomy Microprocess. Microsystems The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
48Harris E. Michail, George Athanasiou, Vasilios I. Kelefouras, George Theodoridis, Thanos Stouraitis, Costas E. Goutis Area-Throughput Trade-Offs for SHA-1 and SHA-256 Hash Functions' Pipelined Designs. Search on Bibsonomy J. Circuits Syst. Comput. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
48Mooseop Kim, Deok-Gyu Lee, Jaecheol Ryou 0001 Compact and unified hardware architecture for SHA-1 and SHA-256 of trusted mobile computing. Search on Bibsonomy Pers. Ubiquitous Comput. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
48Jun-Cheol Jeon, Kang-Joong Seo, Kee-Won Kim Hardware complexity of SHA-1 and SHA-256 based on area and time analysis. Search on Bibsonomy ICOIN The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
48Yu Sasaki, Lei Wang 0031, Kazumaro Aoki Preimage Attacks on 41-Step SHA-256 and 46-Step SHA-512. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2009 DBLP  BibTeX  RDF
48Imtiaz Ahmad, A. Shoba Das Hardware implementation analysis of SHA-256 and SHA-512 algorithms on FPGAs. Search on Bibsonomy Comput. Electr. Eng. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
48 A Presentation on VEST Hardware Performance, Chip Area Measurements, Power Consumption Estimates and Benchmarking in Relation to the AES, SHA-256 and SHA-512. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2005 DBLP  BibTeX  RDF
48Hachem Bensalem, Yves Blaquière, Yvon Savaria Acceleration of the Secure Hash Algorithm-256 (SHA-256) on an FPGA-CPU Cluster Using OpenCL. Search on Bibsonomy ISCAS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
48Fatma Kahri, Hassen Mestiri, Belgacem Bouallegue, Mohsen Machhout Efficient FPGA hardware implementation of secure hash function SHA-256/Blake-256. Search on Bibsonomy SSD The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
42Robert P. McEvoy, Francis M. Crowe, Colin C. Murphy, William P. Marnane Optimisation of the SHA-2 Family of Hash Functions on FPGAs. Search on Bibsonomy ISVLSI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
42Martin Feldhofer, Christian Rechberger A Case Against Currently Used Hash Functions in RFID Protocols. Search on Bibsonomy OTM Workshops (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
32B. Rahul, K. Kuppusamy, A. Senthilrajan Bio-Metric Based Colour-Image-Encryption using Multi-Chaotic Dynamical Systems and SHA-256 Hash Algorithm. Search on Bibsonomy Inf. Secur. J. A Glob. Perspect. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
32Lucas Daudt Franck, Gabriel Augusto Ginja, João Paulo Carmo, José A. Afonso 0001, Maximiliam Luppe Custom ASIC Design for SHA-256 Using Open-Source Tools. Search on Bibsonomy Comput. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
32Ahmet Orun, Fatih Kurugollu The lower energy consumption in cryptocurrency mining processes by SHA-256 Quantum circuit design used in hybrid computing domains. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
32Jongheon Lee, Sokjoon Lee, You-Seok Lee, Dooho Choi T-depth reduction method for efficient SHA-256 quantum circuit construction. Search on Bibsonomy IET Inf. Secur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
32Ziheng Wang 0002, Xiaoshe Dong, Yan Kang 0005, Heng Chen 0002 Parallel SHA-256 on SW26010 many-core processor for hashing of multiple messages. Search on Bibsonomy J. Supercomput. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
32B. Rahul, K. Kuppusamy, A. Senthilrajan Chaos-based audio encryption algorithm using biometric image and SHA-256 hash algorithm. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
32Junfeng Wu, Jialu Zhang, Dong Liu, Xiaofeng Wang A Multiple-Medical-Image Encryption Method Based on SHA-256 and DNA Encoding. Search on Bibsonomy Entropy The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
32Yingxin Li, Fukang Liu, Gaoli Wang New Records in Collision Attacks on RIPEMD-160 and SHA-256. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
32Andrey Plotnikov, Alla Levina Algorithm for simplifying the SHA-256 operations tree. Search on Bibsonomy CSR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
32Mohammed Alkhyeli, Shaheen Alkhyeli, Khalifa Aldhaheri, Hanane Lamaazi Secure Chat Room Application Using AES-GCM Encryption and SHA-256. Search on Bibsonomy IIT The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
32Xiyu Sun, Zhong Chen A Novel Chaotic Image Encryption Algorithm Based on Coordinate Descent and SHA-256. Search on Bibsonomy IEEE Access The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
32Rajiv Ranjan Suman, Bhaskar Mondal, Tarni Mandal A secure encryption scheme using a Composite Logistic Sine Map (CLSM) and SHA-256. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
32Ray A. Perlner, John Kelsey, David A. Cooper Breaking Category Five SPHINCS+ with SHA-256. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2022 DBLP  BibTeX  RDF
32Ignacio Algredo-Badillo, Miguel Morales-Sandoval, Alejandro Medina-Santiago, Carlos Arturo Hernández-Gracidas, Mariana Lobato Báez, Luis Alberto Morales-Rosales A SHA-256 Hybrid-Redundancy Hardware Architecture for Detecting and Correcting Errors. Search on Bibsonomy Sensors The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
32Ray A. Perlner, John Kelsey, David A. Cooper Breaking Category Five SPHINCS+ with SHA-256. Search on Bibsonomy PQCrypto The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
32Bharat S. Rawal, Lingampally Shiva Kumar, Sriram Maganti, Varun Godha Comparative Study of Sha-256 Optimization Techniques. Search on Bibsonomy AIIoT The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
32Reza Fotohi, Fereidoon Shams Aliee Securing communication between things using blockchain technology based on authentication and SHA-256 to improving scalability in large-scale IoT. Search on Bibsonomy Comput. Networks The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
32Juan Wang, Ge Liu, Yongqi Chen, Shu Wang Construction and Analysis of SHA-256 Compression Function Based on Chaos S-Box. Search on Bibsonomy IEEE Access The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
32Thi Hong Tran, Hoai Luan Pham, Yasuhiko Nakashima A High-Performance Multimem SHA-256 Accelerator for Society 5.0. Search on Bibsonomy IEEE Access The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
32Reena Maharjan, Abeer Alsadoon, P. W. C. Prasad, Nabil Giweli, Omar Hisham Alsadoon A novel secure solution of using mixed reality in data transmission for bowel and jaw surgical training: markov property using SHA 256. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
32Kirtee Panwar, Ravindra Kumar Purwar, Garima Srivastava A Fast Encryption Scheme Suitable for Video Surveillance Applications Using SHA-256 Hash Function and 1D Sine-Sine Chaotic Map. Search on Bibsonomy Int. J. Image Graph. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
32Kazuki Nakamura, Koji Hori, Shoichi Hirose Algebraic Fault Analysis of SHA-256 Compression Function and Its Application. Search on Bibsonomy Inf. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
32Mellila Bouam, Charles Bouillaguet, Claire Delaplace, Camille Noûs Computational records with aging hardware: Controlling half the output of SHA-256. Search on Bibsonomy Parallel Comput. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
32Mellila Bouam, Charles Bouillaguet, Claire Delaplace, Camille Noûs Computational Records with Aging Hardware: Controlling Half the Output of SHA-256. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2021 DBLP  BibTeX  RDF
32Van Dai Phan, Hoai Luan Pham, Thi Hong Tran, Yasuhiko Nakashima High Performance Multicore SHA-256 Accelerator using Fully Parallel Computation and Local Memory. Search on Bibsonomy COOL CHIPS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
32Jongheon Lee, Sokjoon Lee, You-Seok Lee, Dooho Choi T-depth Reduction Method for Efficient SHA-256 Quantum Circuit Construction. Search on Bibsonomy ICISC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
32Raffaele Martino, Alessandro Cilardo Designing a SHA-256 processor for blockchain-based IoT applications. Search on Bibsonomy Internet Things The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
32Hoai Luan Pham, Thi Hong Tran, Tri Dung Phan, Vu Trung Duong Le, Duc Khai Lam, Yasuhiko Nakashima Double SHA-256 Hardware Architecture With Compact Message Expander for Bitcoin Mining. Search on Bibsonomy IEEE Access The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
32Ruizhen Wu, Xiaoyong Zhang, Mingming Wang, Lin Wang A High-Performance Parallel Hardware Architecture of SHA-256 Hash in ASIC. Search on Bibsonomy ICACT The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
32Ali H. Gad, Seif Eldeen E. Abdalazeem, Omar A. Abdelmegid, Hassan Mostafa Low power and area SHA-256 hardware accelerator on Virtex-7 FPGA. Search on Bibsonomy NILES The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
32Yimeng Chen, Shuguo Li A High-Throughput Hardware Implementation of SHA-256 Algorithm. Search on Bibsonomy ISCAS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
32Imed Ben Dhaou, Hannu Tenhunen A High-Throughput Architecture for the SHA-256/224 Compliant With the DSRC Standard. Search on Bibsonomy Int. J. Embed. Real Time Commun. Syst. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
32Raffaele Martino, Alessandro Cilardo A Configurable Implementation of the SHA-256 Hash Function. Search on Bibsonomy 3PGCIC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
32Xiaoyong Zhang, Ruizhen Wu, Mingming Wang, Lin Wang A High-Performance Parallel Computation Hardware Architecture in ASIC of SHA-256 Hash. Search on Bibsonomy ICACT The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
32Junshang Li, Zishang He, Yajie Qin Design of Asynchronous High Throughput SHA-256 Hardware Accelerator in 40nm CMOS. Search on Bibsonomy ASICON The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
32Artur Hlobaz Statistical Analysis of Enhanced SDEx Encryption Method Based on SHA-256 Hash Function. Search on Bibsonomy LCN The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
32Argirios Sideris, Theodora Sanida, Minas Dasygenis Hardware Acceleration of SHA-256 Algorithm Using NIOS-II Processor. Search on Bibsonomy MOCAST The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
32Daisuke Oku, Masao Yanagisawa, Nozomu Togawa Scan-based Side-channel Attack against HMAC-SHA-256 Circuits Based on Isolating Bit-transition Groups Using Scan Signatures. Search on Bibsonomy IPSJ Trans. Syst. LSI Des. Methodol. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
32Shuqin Zhu, Congxu Zhu, Wenhong Wang A New Image Encryption Algorithm Based on Chaos and Secure Hash SHA-256. Search on Bibsonomy Entropy The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
32Ming Ming Wong, Vikramkumar Pudi, Anupam Chattopadhyay Lightweight and High Performance SHA-256 using Architectural Folding and 4-2 Adder Compressor. Search on Bibsonomy VLSI-SoC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
32Daisuke Oku, Masao Yanagisawa, Nozomu Togawa A robust scan-based side-channel attack method against HMAC-SHA-256 circuits. Search on Bibsonomy ICCE-Berlin The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
32Meelu Padhi, Ravindra Chaudhari An optimized pipelined architecture of SHA-256 hash function. Search on Bibsonomy ISED The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
32Marek Sýs, Dusan Klinec, Karel Kubicek 0001, Petr Svenda BoolTest: The Fast Randomness Testing Strategy Based on Boolean Functions with Application to DES, 3-DES, MD5, MD6 and SHA-256. Search on Bibsonomy ICETE (Selected Papers) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
32Aqeel-ur Rehman, Xiaofeng Liao 0001, Ayesha Kulsoom, Sami Ullah A modified (Dual) fusion technique for image encryption using SHA-256 hash and multiple chaotic maps. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
32Michael Hutter Threshold Implementations in Industry: A Case Study on SHA-256. Search on Bibsonomy TIS@CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
32William L. Harrison, Adam M. Procter, Gerard Allwein Model-driven design & synthesis of the SHA-256 cryptographic hash function in rewire. Search on Bibsonomy RSP The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
32Florian Mendel, Tomislav Nad, Martin Schläffer Improving Local Collisions: New Attacks on Reduced SHA-256. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2015 DBLP  BibTeX  RDF
32Andrew W. Appel Verification of a Cryptographic Primitive: SHA-256. Search on Bibsonomy ACM Trans. Program. Lang. Syst. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
32Harris E. Michail, Apostolis Kotsiolis, Athanasios Kakarountas, George Athanasiou, Costas E. Goutis Hardware implementation of the Totally Self-Checking SHA-256 hash core. Search on Bibsonomy EUROCON The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
32Andrew W. Appel Verification of a cryptographic primitive: SHA-256 (abstract). Search on Bibsonomy PLDI The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
32Rommel García, Ignacio Algredo-Badillo, Miguel Morales-Sandoval, Claudia Feregrino Uribe, René Cumplido A compact FPGA-based processor for the Secure Hash Algorithm SHA-256. Search on Bibsonomy Comput. Electr. Eng. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
32Shay Gueron Parallelized hashing via j-lanes and j-pointers tree modes, with applications to SHA-256. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2014 DBLP  BibTeX  RDF
32Chu-Hsing Lin, Chen-Yu Lee, Krishna M. Kavi, Deng-Jyi Chen, Yi-Shiung Yeh Finding Near-Optimum Message Scheduling Settings for SHA-256 Variants Using Genetic Algorithms. Search on Bibsonomy J. Inf. Sci. Eng. The full citation details ... 2013 DBLP  BibTeX  RDF
32Ignacio Algredo-Badillo, Claudia Feregrino Uribe, René Cumplido, Miguel Morales-Sandoval FPGA-based implementation alternatives for the inner loop of the Secure Hash Algorithm SHA-256. Search on Bibsonomy Microprocess. Microsystems The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
32Jan A. Bergstra, Cornelis A. Middelburg Instruction sequence expressions for the secure hash algorithm SHA-256. Search on Bibsonomy CoRR The full citation details ... 2013 DBLP  BibTeX  RDF
32Florian Mendel, Tomislav Nad, Martin Schläffer Improving Local Collisions: New Attacks on Reduced SHA-256. Search on Bibsonomy EUROCRYPT The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 124 (100 per page; Change: )
Pages: [1][2][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license