The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase SHA-512 (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
2002-2008 (20) 2009-2014 (15) 2015-2021 (19) 2022-2024 (2)
Publication types (Num. hits)
article(24) inproceedings(32)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 15 occurrences of 11 keywords

Results
Found 56 publication records. Showing 56 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
250Somitra Kumar Sanadhya, Palash Sarkar 0001 New Collision Attacks against Up to 24-Step SHA-2. Search on Bibsonomy INDOCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF SHA-2 hash family, reduced round attacks, Cryptanalysis
186Somitra Kumar Sanadhya, Palash Sarkar 0001 Non-linear Reduced Round Attacks against SHA-2 Hash Family. Search on Bibsonomy ACISP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
156Takanori Isobe 0001, Kyoji Shibutani Preimage Attacks on Reduced Tiger and SHA-2. Search on Bibsonomy FSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF SHA-512, hash function, preimage attack, second preimage attack, meet-in-the-middle, SHA-256, Tiger
135Kazumaro Aoki, Jian Guo 0001, Krystian Matusiewicz, Yu Sasaki, Lei Wang 0031 Preimages for Step-Reduced SHA-2. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF SHA-512, hash, preimage attack, meet-in-the-middle, SHA-256
116Roar Lien, Tim Grembowski, Kris Gaj A 1 Gbit/s Partially Unrolled Architecture of Hash Functions SHA-1 and SHA-512. Search on Bibsonomy CT-RSA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
116Tim Grembowski, Roar Lien, Kris Gaj, Nghi Nguyen, Peter Bellows, Jaroslav Flidr, Tom Lehman, Brian Schott Comparative Analysis of the Hardware Implementations of Hash Functions SHA-1 and SHA-512. Search on Bibsonomy ISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
108Somitra Kumar Sanadhya, Palash Sarkar 0001 Deterministic Constructions of 21-Step Collisions for the SHA-2 Hash Family. Search on Bibsonomy ISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF SHA-2 family, reduced round attacks, cryptanalysis
105Hidenori Kuwakado, Shoichi Hirose Pseudorandom-Function Property of the Step-Reduced Compression Functions of SHA-256 and SHA-512. Search on Bibsonomy WISA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
95Akashi Satoh ASIC hardware implementations for 512-bit hash function Whirlpool. Search on Bibsonomy ISCAS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
84Magnus Nyström Identifiers and Test Vectors for HMAC-SHA-224, HMAC-SHA-256, HMAC-SHA-384, and HMAC-SHA-512. Search on Bibsonomy RFC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
74Junko Nakajima, Mitsuru Matsui Performance Analysis and Parallel Implementation of Dedicated Hash Functions. Search on Bibsonomy EUROCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF dedicated hash functions, Pentium III, parallel implementations
71Christoph Dobraunig, Maria Eichlseder, Florian Mendel Analysis of SHA-512/224 and SHA-512/256. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2016 DBLP  BibTeX  RDF
71Christoph Dobraunig, Maria Eichlseder, Florian Mendel Analysis of SHA-512/224 and SHA-512/256. Search on Bibsonomy ASIACRYPT (2) The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
68Shay Gueron Speeding Up SHA-1, SHA-256 and SHA-512 on the 2nd Generation Intel® Core™ Processors. Search on Bibsonomy ITNG The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
68Scott G. Kelly, Sheila Frankel Using HMAC-SHA-256, HMAC-SHA-384, and HMAC-SHA-512 with IPsec. Search on Bibsonomy RFC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
56Hong-qiang Li, Chang-yun Miao Hardware Implementation of Hash Function SHA-512. Search on Bibsonomy ICICIC (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
52Akinori Hosoyamada, Yu Sasaki Quantum Collision Attacks on Reduced SHA-256 and SHA-512. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2021 DBLP  BibTeX  RDF
52Akinori Hosoyamada, Yu Sasaki Quantum Collision Attacks on Reduced SHA-256 and SHA-512. Search on Bibsonomy CRYPTO (1) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
52Denis Bider Use of RSA Keys with SHA-256 and SHA-512 in the Secure Shell (SSH) Protocol. Search on Bibsonomy RFC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
52Hongbo Yu, Yonglin Hao, Dongxia Bai Evaluate the security margins of SHA-512, SHA-256 and DHA-256 against the boomerang attack. Search on Bibsonomy Sci. China Inf. Sci. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
52Mohsen Bahramali, Jin Jiang 0001, Arash Reyhani-Masoleh A Fault Detection Scheme for the FPGA Implementation of SHA-1 and SHA-512 Round Computations. Search on Bibsonomy J. Electron. Test. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
52Yu Sasaki, Lei Wang 0031, Kazumaro Aoki Preimage Attacks on 41-Step SHA-256 and 46-Step SHA-512. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2009 DBLP  BibTeX  RDF
52Imtiaz Ahmad, A. Shoba Das Hardware implementation analysis of SHA-256 and SHA-512 algorithms on FPGAs. Search on Bibsonomy Comput. Electr. Eng. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
52 A Presentation on VEST Hardware Performance, Chip Area Measurements, Power Consumption Estimates and Benchmarking in Relation to the AES, SHA-256 and SHA-512. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2005 DBLP  BibTeX  RDF
52Máire McLoone, John V. McCanny Efficient single-chip implementation of SHA-384 and SHA-512. Search on Bibsonomy FPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
44Robert P. McEvoy, Francis M. Crowe, Colin C. Murphy, William P. Marnane Optimisation of the SHA-2 Family of Hash Functions on FPGAs. Search on Bibsonomy ISVLSI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
44Henri Gilbert, Helena Handschuh Security Analysis of SHA-256 and Sisters. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
40Máire McLoone, Ciaran McIvor High-speed & Low Area Hardware Architectures of the Whirlpool Hash Function. Search on Bibsonomy J. VLSI Signal Process. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF hash function implementation, cryptography, whirlpool
36Anjali Malik, Sunil Jadav, Shailender Gupta A multilevel qubit encryption mechanism using SHA-512. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
36Mingyuan Yang, Yemeng Zhang, Bohan Yang 0004, Hanning Wang, Shouyi Yin, Shaojun Wei, Leibo Liu A SHA-512 Hardware Implementation Based on Block RAM Storage Structure. Search on Bibsonomy IPDPS Workshops The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Kunshu Wang, Xiangjun Wu, Hui Wang, Haibin Kan, Jürgen Kurths New color image cryptosystem via SHA-512 and hybrid domain. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
36Christian Franck, Johann Großschädl Optimized Implementation of SHA-512 for 16-Bit MSP430 Microcontrollers. Search on Bibsonomy SecITC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
36Vasyl Sheketa, Mykola Pasieka, Taras Serman, Nadia Pasieka, Svitlana Chupakhina, Larysa Krul System Analysis and Example of Using SHA-512 Hash Functions to Protect Students' Personal Data on Educational Platforms. Search on Bibsonomy CSIT (2) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
36K. Sundara Krishnan, B. Jaison, S. P. Raja 0001 An efficient novel color image encryption algorithm based on 3D Lü chaotic dynamical system and SHA-512. Search on Bibsonomy Int. J. Wavelets Multiresolution Inf. Process. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
36Shihua Zhou, Pinyan He, Nikola K. Kasabov A Dynamic DNA Color Image Encryption Method Based on SHA-512. Search on Bibsonomy Entropy The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
36Artur Hlobaz Statistical Analysis of Enhanced SDEx Encryption Method Based on SHA-512 Hash Function. Search on Bibsonomy ICCCN The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
36Himanshu N. Bhonge, Monish K. Ambat, B. R. Chandavarkar An Experimental Evaluation of SHA-512 for Different Modes of Operation. Search on Bibsonomy ICCCNT The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
36Menglong Wu, Yan Li, Wenkai Liu, Ming Huang A Novel Color Image Encryption Mechanism Based on Visual Cryptography, SHA-512 and One-time Password. Search on Bibsonomy EITCE The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
36Aqeel-ur Rehman, Huiwei Wang, Malik Muhammad Ali Shahid, Salman Iqbal, Zahid Abbas, Amnah Firdous A Selective Cross-Substitution Technique for Encrypting Color Images Using Chaos, DNA Rules and SHA-512. Search on Bibsonomy IEEE Access The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
36Anirban Sengupta, Mahendra Rathor Security of Functionally Obfuscated DSP Core Against Removal Attack Using SHA-512 Based Key Encryption Hardware. Search on Bibsonomy IEEE Access The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
36Musheer Ahmad 0002, Eesa A. Alsolami, Xing-Yuan Wang, Mohammad Najam Doja, Mirza Mohd. Sufyan Beg, Amer Awad Alzaidi Cryptanalysis of an Image Encryption Algorithm Based on Combined Chaos for a BAN System, and Improved Scheme Using SHA-512 and Hyperchaos. Search on Bibsonomy Symmetry The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
36Hao Cheng 0009, Daniel Dinu, Johann Großschädl Efficient Implementation of the SHA-512 Hash Function for 8-Bit AVR Microcontrollers. Search on Bibsonomy SecITC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
36Can Ge, Lingzhi Xu, Weidong Qiu, Zheng Huang, Jie Guo 0011, Guozhen Liu, Zheng Gong Optimized Password Recovery for SHA-512 on GPUs. Search on Bibsonomy CSE/EUC (2) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
36Georgios Athanasiou, Harris E. Michail, George Theodoridis, Costas E. Goutis Optimising the SHA-512 cryptographic hash function on FPGAs. Search on Bibsonomy IET Comput. Digit. Tech. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
36Maria Eichlseder, Florian Mendel, Martin Schläffer Branching Heuristics in Differential Collision Search with Applications to SHA-512. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2014 DBLP  BibTeX  RDF
36Hongbo Yu, Dongxia Bai Boomerang Attack on Step-Reduced SHA-512. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2014 DBLP  BibTeX  RDF
36Hongbo Yu, Dongxia Bai Boomerang Attack on Step-Reduced SHA-512. Search on Bibsonomy Inscrypt The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
36Maria Eichlseder, Florian Mendel, Martin Schläffer Branching Heuristics in Differential Collision Search with Applications to SHA-512. Search on Bibsonomy FSE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
36Abdulhadi Shoufan A fault attack on a hardware-based implementation of the secure hash algorithm SHA-512. Search on Bibsonomy ReConFig The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
36Ignacio Algredo-Badillo, Miguel Morales-Sandoval, Claudia Feregrino Uribe, René Cumplido Throughput and Efficiency Analysis of Unrolled Hardware Architectures for the SHA-512 Hash Algorithm. Search on Bibsonomy ISVLSI The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
36Shay Gueron, Simon Johnson, Jesse Walker SHA-512/256. Search on Bibsonomy ITNG The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
36Shay Gueron, Simon Johnson, Jesse Walker SHA-512/256. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2010 DBLP  BibTeX  RDF
36R. Kayalvizhi, R. Harihara Subramanian, R. Girish Santhosh, J. Gurubaran, Vaidehi V. VLSI Design and Implementation of Combined Secure Hash Algorithm SHA-512. Search on Bibsonomy CNSA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
36Somitra Kumar Sanadhya, Palash Sarkar 0001 Colliding Message Pairs for 23 and 24-step SHA-512 Search on Bibsonomy CoRR The full citation details ... 2008 DBLP  BibTeX  RDF
36Imtiaz Ahmad, A. Shoba Das Analysis and Detection Of Errors In Implementation Of SHA-512 Algorithms On FPGAs. Search on Bibsonomy Comput. J. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
30Anh Tuan Hoang, Katsuhiro Yamazaki, Shigeru Oyanagi Three-stage pipeline implementation for SHA2 using data forwarding. Search on Bibsonomy FPL The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #56 of 56 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license