|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 15 occurrences of 11 keywords
|
|
|
Results
Found 56 publication records. Showing 56 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
250 | Somitra Kumar Sanadhya, Palash Sarkar 0001 |
New Collision Attacks against Up to 24-Step SHA-2. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2008, 9th International Conference on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedings, pp. 91-103, 2008, Springer, 978-3-540-89753-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
SHA-2 hash family, reduced round attacks, Cryptanalysis |
186 | Somitra Kumar Sanadhya, Palash Sarkar 0001 |
Non-linear Reduced Round Attacks against SHA-2 Hash Family. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008, Proceedings, pp. 254-266, 2008, Springer, 978-3-540-69971-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
156 | Takanori Isobe 0001, Kyoji Shibutani |
Preimage Attacks on Reduced Tiger and SHA-2. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 16th International Workshop, FSE 2009, Leuven, Belgium, February 22-25, 2009, Revised Selected Papers, pp. 139-155, 2009, Springer, 978-3-642-03316-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
SHA-512, hash function, preimage attack, second preimage attack, meet-in-the-middle, SHA-256, Tiger |
135 | Kazumaro Aoki, Jian Guo 0001, Krystian Matusiewicz, Yu Sasaki, Lei Wang 0031 |
Preimages for Step-Reduced SHA-2. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings, pp. 578-597, 2009, Springer, 978-3-642-10365-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
SHA-512, hash, preimage attack, meet-in-the-middle, SHA-256 |
116 | Roar Lien, Tim Grembowski, Kris Gaj |
A 1 Gbit/s Partially Unrolled Architecture of Hash Functions SHA-1 and SHA-512. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2004, The Cryptographers' Track at the RSA Conference 2004, San Francisco, CA, USA, February 23-27, 2004, Proceedings, pp. 324-338, 2004, Springer, 3-540-20996-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
116 | Tim Grembowski, Roar Lien, Kris Gaj, Nghi Nguyen, Peter Bellows, Jaroslav Flidr, Tom Lehman, Brian Schott |
Comparative Analysis of the Hardware Implementations of Hash Functions SHA-1 and SHA-512. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 5th International Conference, ISC 2002 Sao Paulo, Brazil, September 30 - October 2, 2002, Proceedings, pp. 75-89, 2002, Springer, 3-540-44270-7. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
108 | Somitra Kumar Sanadhya, Palash Sarkar 0001 |
Deterministic Constructions of 21-Step Collisions for the SHA-2 Hash Family. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings, pp. 244-259, 2008, Springer, 978-3-540-85884-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
SHA-2 family, reduced round attacks, cryptanalysis |
105 | Hidenori Kuwakado, Shoichi Hirose |
Pseudorandom-Function Property of the Step-Reduced Compression Functions of SHA-256 and SHA-512. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications, 9th International Workshop, WISA 2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected Papers, pp. 174-189, 2008, Springer, 978-3-642-00305-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
95 | Akashi Satoh |
ASIC hardware implementations for 512-bit hash function Whirlpool. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCAS ![In: International Symposium on Circuits and Systems (ISCAS 2008), 18-21 May 2008, Sheraton Seattle Hotel, Seattle, Washington, USA, pp. 2917-2920, 2008, IEEE, 978-1-4244-1683-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
84 | Magnus Nyström |
Identifiers and Test Vectors for HMAC-SHA-224, HMAC-SHA-256, HMAC-SHA-384, and HMAC-SHA-512. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 4231, pp. 1-9, December 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
74 | Junko Nakajima, Mitsuru Matsui |
Performance Analysis and Parallel Implementation of Dedicated Hash Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28 - May 2, 2002, Proceedings, pp. 165-180, 2002, Springer, 3-540-43553-0. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
dedicated hash functions, Pentium III, parallel implementations |
71 | Christoph Dobraunig, Maria Eichlseder, Florian Mendel |
Analysis of SHA-512/224 and SHA-512/256. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2016, pp. 374, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
71 | Christoph Dobraunig, Maria Eichlseder, Florian Mendel |
Analysis of SHA-512/224 and SHA-512/256. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT (2) ![In: Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 - December 3, 2015, Proceedings, Part II, pp. 612-630, 2015, Springer, 978-3-662-48799-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
68 | Shay Gueron |
Speeding Up SHA-1, SHA-256 and SHA-512 on the 2nd Generation Intel® Core™ Processors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITNG ![In: Ninth International Conference on Information Technology: New Generations, ITNG 2012, Las Vegas, Nevada, USA, 16-18 April, 2012, pp. 824-826, 2012, IEEE Computer Society, 978-0-7695-4654-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
68 | Scott G. Kelly, Sheila Frankel |
Using HMAC-SHA-256, HMAC-SHA-384, and HMAC-SHA-512 with IPsec. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 4868, pp. 1-21, May 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
56 | Hong-qiang Li, Chang-yun Miao |
Hardware Implementation of Hash Function SHA-512. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICIC (2) ![In: First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August - 1 September 2006, Beijing, China, pp. 38-42, 2006, IEEE Computer Society, 0-7695-2616-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
52 | Akinori Hosoyamada, Yu Sasaki |
Quantum Collision Attacks on Reduced SHA-256 and SHA-512. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2021, pp. 292, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
52 | Akinori Hosoyamada, Yu Sasaki |
Quantum Collision Attacks on Reduced SHA-256 and SHA-512. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO (1) ![In: Advances in Cryptology - CRYPTO 2021 - 41st Annual International Cryptology Conference, CRYPTO 2021, Virtual Event, August 16-20, 2021, Proceedings, Part I, pp. 616-646, 2021, Springer, 978-3-030-84241-3. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
52 | Denis Bider |
Use of RSA Keys with SHA-256 and SHA-512 in the Secure Shell (SSH) Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 8332, pp. 1-9, March 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
52 | Hongbo Yu, Yonglin Hao, Dongxia Bai |
Evaluate the security margins of SHA-512, SHA-256 and DHA-256 against the boomerang attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sci. China Inf. Sci. ![In: Sci. China Inf. Sci. 59(5), pp. 052110:1-052110:14, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
52 | Mohsen Bahramali, Jin Jiang 0001, Arash Reyhani-Masoleh |
A Fault Detection Scheme for the FPGA Implementation of SHA-1 and SHA-512 Round Computations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Electron. Test. ![In: J. Electron. Test. 27(4), pp. 517-530, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
52 | Yu Sasaki, Lei Wang 0031, Kazumaro Aoki |
Preimage Attacks on 41-Step SHA-256 and 46-Step SHA-512. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2009, pp. 479, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
52 | Imtiaz Ahmad, A. Shoba Das |
Hardware implementation analysis of SHA-256 and SHA-512 algorithms on FPGAs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Electr. Eng. ![In: Comput. Electr. Eng. 31(6), pp. 345-360, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
52 | |
A Presentation on VEST Hardware Performance, Chip Area Measurements, Power Consumption Estimates and Benchmarking in Relation to the AES, SHA-256 and SHA-512. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2005, pp. 415, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
52 | Máire McLoone, John V. McCanny |
Efficient single-chip implementation of SHA-384 and SHA-512. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FPT ![In: Proceedings of the 2002 IEEE International Conference on Field-Programmable Technology, FPT 2002, Hong Kong, China, December 16-18, 2002, pp. 311-314, 2002, IEEE, 0-7803-7574-2. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
44 | Robert P. McEvoy, Francis M. Crowe, Colin C. Murphy, William P. Marnane |
Optimisation of the SHA-2 Family of Hash Functions on FPGAs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISVLSI ![In: 2006 IEEE Computer Society Annual Symposium on VLSI (ISVLSI 2006), 2-3 March 2006, Karlsruhe, Germany, pp. 317-322, 2006, IEEE Computer Society, 0-7695-2533-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
44 | Henri Gilbert, Helena Handschuh |
Security Analysis of SHA-256 and Sisters. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography, 10th Annual International Workshop, SAC 2003, Ottawa, Canada, August 14-15, 2003, Revised Papers, pp. 175-193, 2003, Springer, 3-540-21370-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
40 | Máire McLoone, Ciaran McIvor |
High-speed & Low Area Hardware Architectures of the Whirlpool Hash Function. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. VLSI Signal Process. ![In: J. VLSI Signal Process. 47(1), pp. 47-57, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
hash function implementation, cryptography, whirlpool |
36 | Anjali Malik, Sunil Jadav, Shailender Gupta |
A multilevel qubit encryption mechanism using SHA-512. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multim. Tools Appl. ![In: Multim. Tools Appl. 83(12), pp. 34995-35024, April 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
36 | Mingyuan Yang, Yemeng Zhang, Bohan Yang 0004, Hanning Wang, Shouyi Yin, Shaojun Wei, Leibo Liu |
A SHA-512 Hardware Implementation Based on Block RAM Storage Structure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPDPS Workshops ![In: IEEE International Parallel and Distributed Processing Symposium, IPDPS Workshops 2022, Lyon, France, May 30 - June 3, 2022, pp. 132-135, 2022, IEEE, 978-1-6654-9747-3. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
36 | Kunshu Wang, Xiangjun Wu, Hui Wang, Haibin Kan, Jürgen Kurths |
New color image cryptosystem via SHA-512 and hybrid domain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multim. Tools Appl. ![In: Multim. Tools Appl. 80(12), pp. 18875-18899, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
36 | Christian Franck, Johann Großschädl |
Optimized Implementation of SHA-512 for 16-Bit MSP430 Microcontrollers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecITC ![In: Innovative Security Solutions for Information Technology and Communications - 14th International Conference, SecITC 2021, Virtual Event, November 25-26, 2021, Revised Selected Papers, pp. 86-99, 2021, Springer, 978-3-031-17509-1. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
36 | Vasyl Sheketa, Mykola Pasieka, Taras Serman, Nadia Pasieka, Svitlana Chupakhina, Larysa Krul |
System Analysis and Example of Using SHA-512 Hash Functions to Protect Students' Personal Data on Educational Platforms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSIT (2) ![In: IEEE 16th International Conference on Computer Sciences and Information Technologies, CSIT 2021, Lviv, Ukraine, September 22-25, 2021, pp. 132-136, 2021, IEEE, 978-1-6654-4257-2. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
36 | K. Sundara Krishnan, B. Jaison, S. P. Raja 0001 |
An efficient novel color image encryption algorithm based on 3D Lü chaotic dynamical system and SHA-512. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Wavelets Multiresolution Inf. Process. ![In: Int. J. Wavelets Multiresolution Inf. Process. 18(5), pp. 2050042:1-2050042:30, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
36 | Shihua Zhou, Pinyan He, Nikola K. Kasabov |
A Dynamic DNA Color Image Encryption Method Based on SHA-512. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Entropy ![In: Entropy 22(10), pp. 1091, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
36 | Artur Hlobaz |
Statistical Analysis of Enhanced SDEx Encryption Method Based on SHA-512 Hash Function. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCCN ![In: 29th International Conference on Computer Communications and Networks, ICCCN 2020, Honolulu, HI, USA, August 3-6, 2020, pp. 1-6, 2020, IEEE, 978-1-7281-6607-0. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
36 | Himanshu N. Bhonge, Monish K. Ambat, B. R. Chandavarkar |
An Experimental Evaluation of SHA-512 for Different Modes of Operation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCCNT ![In: 11th International Conference on Computing, Communication and Networking Technologies, ICCCNT 2020, Kharagpur, India, July 1-3, 2020, pp. 1-6, 2020, IEEE, 978-1-7281-6851-7. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
36 | Menglong Wu, Yan Li, Wenkai Liu, Ming Huang |
A Novel Color Image Encryption Mechanism Based on Visual Cryptography, SHA-512 and One-time Password. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EITCE ![In: EITCE 2020: 4th International Conference on Electronic Information Technology and Computer Engineering, Xiamen, China, 6 November, 2020 - 8 November, 2020, pp. 438-443, 2020, ACM, 978-1-4503-8781-1. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
36 | Aqeel-ur Rehman, Huiwei Wang, Malik Muhammad Ali Shahid, Salman Iqbal, Zahid Abbas, Amnah Firdous |
A Selective Cross-Substitution Technique for Encrypting Color Images Using Chaos, DNA Rules and SHA-512. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 7, pp. 162786-162802, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
36 | Anirban Sengupta, Mahendra Rathor |
Security of Functionally Obfuscated DSP Core Against Removal Attack Using SHA-512 Based Key Encryption Hardware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 7, pp. 4598-4610, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
36 | Musheer Ahmad 0002, Eesa A. Alsolami, Xing-Yuan Wang, Mohammad Najam Doja, Mirza Mohd. Sufyan Beg, Amer Awad Alzaidi |
Cryptanalysis of an Image Encryption Algorithm Based on Combined Chaos for a BAN System, and Improved Scheme Using SHA-512 and Hyperchaos. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Symmetry ![In: Symmetry 10(7), pp. 266, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
36 | Hao Cheng 0009, Daniel Dinu, Johann Großschädl |
Efficient Implementation of the SHA-512 Hash Function for 8-Bit AVR Microcontrollers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecITC ![In: Innovative Security Solutions for Information Technology and Communications - 11th International Conference, SecITC 2018, Bucharest, Romania, November 8-9, 2018, Revised Selected Papers, pp. 273-287, 2018, Springer, 978-3-030-12941-5. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
36 | Can Ge, Lingzhi Xu, Weidong Qiu, Zheng Huang, Jie Guo 0011, Guozhen Liu, Zheng Gong |
Optimized Password Recovery for SHA-512 on GPUs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSE/EUC (2) ![In: 2017 IEEE International Conference on Computational Science and Engineering, CSE 2017, and IEEE International Conference on Embedded and Ubiquitous Computing, EUC 2017, Guangzhou, China, July 21-24, 2017, Volume 2, pp. 226-229, 2017, IEEE Computer Society, 978-1-5386-3220-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
36 | Georgios Athanasiou, Harris E. Michail, George Theodoridis, Costas E. Goutis |
Optimising the SHA-512 cryptographic hash function on FPGAs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IET Comput. Digit. Tech. ![In: IET Comput. Digit. Tech. 8(2), pp. 70-82, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
36 | Maria Eichlseder, Florian Mendel, Martin Schläffer |
Branching Heuristics in Differential Collision Search with Applications to SHA-512. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2014, pp. 302, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
36 | Hongbo Yu, Dongxia Bai |
Boomerang Attack on Step-Reduced SHA-512. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2014, pp. 945, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
36 | Hongbo Yu, Dongxia Bai |
Boomerang Attack on Step-Reduced SHA-512. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inscrypt ![In: Information Security and Cryptology - 10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected Papers, pp. 329-342, 2014, Springer, 978-3-319-16744-2. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
36 | Maria Eichlseder, Florian Mendel, Martin Schläffer |
Branching Heuristics in Differential Collision Search with Applications to SHA-512. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption - 21st International Workshop, FSE 2014, London, UK, March 3-5, 2014. Revised Selected Papers, pp. 473-488, 2014, Springer, 978-3-662-46705-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
36 | Abdulhadi Shoufan |
A fault attack on a hardware-based implementation of the secure hash algorithm SHA-512. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ReConFig ![In: 2012 International Conference on Reconfigurable Computing and FPGAs, ReConFig 2013, Cancun, Mexico, December 9-11, 2013, pp. 1-7, 2013, IEEE, 978-1-4799-2079-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
36 | Ignacio Algredo-Badillo, Miguel Morales-Sandoval, Claudia Feregrino Uribe, René Cumplido |
Throughput and Efficiency Analysis of Unrolled Hardware Architectures for the SHA-512 Hash Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISVLSI ![In: IEEE Computer Society Annual Symposium on VLSI, ISVLSI 2012, Amherst, MA, USA, August 19-21, 2012, pp. 63-68, 2012, IEEE Computer Society, 978-1-4673-2234-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
36 | Shay Gueron, Simon Johnson, Jesse Walker |
SHA-512/256. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITNG ![In: Eighth International Conference on Information Technology: New Generations, ITNG 2011, Las Vegas, Nevada, USA, 11-13 April 2011, pp. 354-358, 2011, IEEE Computer Society, 978-0-7695-4367-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
36 | Shay Gueron, Simon Johnson, Jesse Walker |
SHA-512/256. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2010, pp. 548, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
36 | R. Kayalvizhi, R. Harihara Subramanian, R. Girish Santhosh, J. Gurubaran, Vaidehi V. |
VLSI Design and Implementation of Combined Secure Hash Algorithm SHA-512. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CNSA ![In: Recent Trends in Network Security and Applications - Third International Conference, CNSA 2010, Chennai, India, July 23-25, 2010. Proceedings, pp. 105-113, 2010, Springer, 978-3-642-14477-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
36 | Somitra Kumar Sanadhya, Palash Sarkar 0001 |
Colliding Message Pairs for 23 and 24-step SHA-512 ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/0809.0216, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
36 | Imtiaz Ahmad, A. Shoba Das |
Analysis and Detection Of Errors In Implementation Of SHA-512 Algorithms On FPGAs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. J. ![In: Comput. J. 50(6), pp. 728-738, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
30 | Anh Tuan Hoang, Katsuhiro Yamazaki, Shigeru Oyanagi |
Three-stage pipeline implementation for SHA2 using data forwarding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FPL ![In: FPL 2008, International Conference on Field Programmable Logic and Applications, Heidelberg, Germany, 8-10 September 2008, pp. 29-34, 2008, IEEE, 978-1-4244-1961-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #56 of 56 (100 per page; Change: )
|
|