|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 15 occurrences of 11 keywords
|
|
|
Results
Found 56 publication records. Showing 56 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
250 | Somitra Kumar Sanadhya, Palash Sarkar 0001 |
New Collision Attacks against Up to 24-Step SHA-2. |
INDOCRYPT |
2008 |
DBLP DOI BibTeX RDF |
SHA-2 hash family, reduced round attacks, Cryptanalysis |
186 | Somitra Kumar Sanadhya, Palash Sarkar 0001 |
Non-linear Reduced Round Attacks against SHA-2 Hash Family. |
ACISP |
2008 |
DBLP DOI BibTeX RDF |
|
156 | Takanori Isobe 0001, Kyoji Shibutani |
Preimage Attacks on Reduced Tiger and SHA-2. |
FSE |
2009 |
DBLP DOI BibTeX RDF |
SHA-512, hash function, preimage attack, second preimage attack, meet-in-the-middle, SHA-256, Tiger |
135 | Kazumaro Aoki, Jian Guo 0001, Krystian Matusiewicz, Yu Sasaki, Lei Wang 0031 |
Preimages for Step-Reduced SHA-2. |
ASIACRYPT |
2009 |
DBLP DOI BibTeX RDF |
SHA-512, hash, preimage attack, meet-in-the-middle, SHA-256 |
116 | Roar Lien, Tim Grembowski, Kris Gaj |
A 1 Gbit/s Partially Unrolled Architecture of Hash Functions SHA-1 and SHA-512. |
CT-RSA |
2004 |
DBLP DOI BibTeX RDF |
|
116 | Tim Grembowski, Roar Lien, Kris Gaj, Nghi Nguyen, Peter Bellows, Jaroslav Flidr, Tom Lehman, Brian Schott |
Comparative Analysis of the Hardware Implementations of Hash Functions SHA-1 and SHA-512. |
ISC |
2002 |
DBLP DOI BibTeX RDF |
|
108 | Somitra Kumar Sanadhya, Palash Sarkar 0001 |
Deterministic Constructions of 21-Step Collisions for the SHA-2 Hash Family. |
ISC |
2008 |
DBLP DOI BibTeX RDF |
SHA-2 family, reduced round attacks, cryptanalysis |
105 | Hidenori Kuwakado, Shoichi Hirose |
Pseudorandom-Function Property of the Step-Reduced Compression Functions of SHA-256 and SHA-512. |
WISA |
2008 |
DBLP DOI BibTeX RDF |
|
95 | Akashi Satoh |
ASIC hardware implementations for 512-bit hash function Whirlpool. |
ISCAS |
2008 |
DBLP DOI BibTeX RDF |
|
84 | Magnus Nyström |
Identifiers and Test Vectors for HMAC-SHA-224, HMAC-SHA-256, HMAC-SHA-384, and HMAC-SHA-512. |
RFC |
2005 |
DBLP DOI BibTeX RDF |
|
74 | Junko Nakajima, Mitsuru Matsui |
Performance Analysis and Parallel Implementation of Dedicated Hash Functions. |
EUROCRYPT |
2002 |
DBLP DOI BibTeX RDF |
dedicated hash functions, Pentium III, parallel implementations |
71 | Christoph Dobraunig, Maria Eichlseder, Florian Mendel |
Analysis of SHA-512/224 and SHA-512/256. |
IACR Cryptol. ePrint Arch. |
2016 |
DBLP BibTeX RDF |
|
71 | Christoph Dobraunig, Maria Eichlseder, Florian Mendel |
Analysis of SHA-512/224 and SHA-512/256. |
ASIACRYPT (2) |
2015 |
DBLP DOI BibTeX RDF |
|
68 | Shay Gueron |
Speeding Up SHA-1, SHA-256 and SHA-512 on the 2nd Generation Intel® Core™ Processors. |
ITNG |
2012 |
DBLP DOI BibTeX RDF |
|
68 | Scott G. Kelly, Sheila Frankel |
Using HMAC-SHA-256, HMAC-SHA-384, and HMAC-SHA-512 with IPsec. |
RFC |
2007 |
DBLP DOI BibTeX RDF |
|
56 | Hong-qiang Li, Chang-yun Miao |
Hardware Implementation of Hash Function SHA-512. |
ICICIC (2) |
2006 |
DBLP DOI BibTeX RDF |
|
52 | Akinori Hosoyamada, Yu Sasaki |
Quantum Collision Attacks on Reduced SHA-256 and SHA-512. |
IACR Cryptol. ePrint Arch. |
2021 |
DBLP BibTeX RDF |
|
52 | Akinori Hosoyamada, Yu Sasaki |
Quantum Collision Attacks on Reduced SHA-256 and SHA-512. |
CRYPTO (1) |
2021 |
DBLP DOI BibTeX RDF |
|
52 | Denis Bider |
Use of RSA Keys with SHA-256 and SHA-512 in the Secure Shell (SSH) Protocol. |
RFC |
2018 |
DBLP DOI BibTeX RDF |
|
52 | Hongbo Yu, Yonglin Hao, Dongxia Bai |
Evaluate the security margins of SHA-512, SHA-256 and DHA-256 against the boomerang attack. |
Sci. China Inf. Sci. |
2016 |
DBLP DOI BibTeX RDF |
|
52 | Mohsen Bahramali, Jin Jiang 0001, Arash Reyhani-Masoleh |
A Fault Detection Scheme for the FPGA Implementation of SHA-1 and SHA-512 Round Computations. |
J. Electron. Test. |
2011 |
DBLP DOI BibTeX RDF |
|
52 | Yu Sasaki, Lei Wang 0031, Kazumaro Aoki |
Preimage Attacks on 41-Step SHA-256 and 46-Step SHA-512. |
IACR Cryptol. ePrint Arch. |
2009 |
DBLP BibTeX RDF |
|
52 | Imtiaz Ahmad, A. Shoba Das |
Hardware implementation analysis of SHA-256 and SHA-512 algorithms on FPGAs. |
Comput. Electr. Eng. |
2005 |
DBLP DOI BibTeX RDF |
|
52 | |
A Presentation on VEST Hardware Performance, Chip Area Measurements, Power Consumption Estimates and Benchmarking in Relation to the AES, SHA-256 and SHA-512. |
IACR Cryptol. ePrint Arch. |
2005 |
DBLP BibTeX RDF |
|
52 | Máire McLoone, John V. McCanny |
Efficient single-chip implementation of SHA-384 and SHA-512. |
FPT |
2002 |
DBLP DOI BibTeX RDF |
|
44 | Robert P. McEvoy, Francis M. Crowe, Colin C. Murphy, William P. Marnane |
Optimisation of the SHA-2 Family of Hash Functions on FPGAs. |
ISVLSI |
2006 |
DBLP DOI BibTeX RDF |
|
44 | Henri Gilbert, Helena Handschuh |
Security Analysis of SHA-256 and Sisters. |
Selected Areas in Cryptography |
2003 |
DBLP DOI BibTeX RDF |
|
40 | Máire McLoone, Ciaran McIvor |
High-speed & Low Area Hardware Architectures of the Whirlpool Hash Function. |
J. VLSI Signal Process. |
2007 |
DBLP DOI BibTeX RDF |
hash function implementation, cryptography, whirlpool |
36 | Anjali Malik, Sunil Jadav, Shailender Gupta |
A multilevel qubit encryption mechanism using SHA-512. |
Multim. Tools Appl. |
2024 |
DBLP DOI BibTeX RDF |
|
36 | Mingyuan Yang, Yemeng Zhang, Bohan Yang 0004, Hanning Wang, Shouyi Yin, Shaojun Wei, Leibo Liu |
A SHA-512 Hardware Implementation Based on Block RAM Storage Structure. |
IPDPS Workshops |
2022 |
DBLP DOI BibTeX RDF |
|
36 | Kunshu Wang, Xiangjun Wu, Hui Wang, Haibin Kan, Jürgen Kurths |
New color image cryptosystem via SHA-512 and hybrid domain. |
Multim. Tools Appl. |
2021 |
DBLP DOI BibTeX RDF |
|
36 | Christian Franck, Johann Großschädl |
Optimized Implementation of SHA-512 for 16-Bit MSP430 Microcontrollers. |
SecITC |
2021 |
DBLP DOI BibTeX RDF |
|
36 | Vasyl Sheketa, Mykola Pasieka, Taras Serman, Nadia Pasieka, Svitlana Chupakhina, Larysa Krul |
System Analysis and Example of Using SHA-512 Hash Functions to Protect Students' Personal Data on Educational Platforms. |
CSIT (2) |
2021 |
DBLP DOI BibTeX RDF |
|
36 | K. Sundara Krishnan, B. Jaison, S. P. Raja 0001 |
An efficient novel color image encryption algorithm based on 3D Lü chaotic dynamical system and SHA-512. |
Int. J. Wavelets Multiresolution Inf. Process. |
2020 |
DBLP DOI BibTeX RDF |
|
36 | Shihua Zhou, Pinyan He, Nikola K. Kasabov |
A Dynamic DNA Color Image Encryption Method Based on SHA-512. |
Entropy |
2020 |
DBLP DOI BibTeX RDF |
|
36 | Artur Hlobaz |
Statistical Analysis of Enhanced SDEx Encryption Method Based on SHA-512 Hash Function. |
ICCCN |
2020 |
DBLP DOI BibTeX RDF |
|
36 | Himanshu N. Bhonge, Monish K. Ambat, B. R. Chandavarkar |
An Experimental Evaluation of SHA-512 for Different Modes of Operation. |
ICCCNT |
2020 |
DBLP DOI BibTeX RDF |
|
36 | Menglong Wu, Yan Li, Wenkai Liu, Ming Huang |
A Novel Color Image Encryption Mechanism Based on Visual Cryptography, SHA-512 and One-time Password. |
EITCE |
2020 |
DBLP DOI BibTeX RDF |
|
36 | Aqeel-ur Rehman, Huiwei Wang, Malik Muhammad Ali Shahid, Salman Iqbal, Zahid Abbas, Amnah Firdous |
A Selective Cross-Substitution Technique for Encrypting Color Images Using Chaos, DNA Rules and SHA-512. |
IEEE Access |
2019 |
DBLP DOI BibTeX RDF |
|
36 | Anirban Sengupta, Mahendra Rathor |
Security of Functionally Obfuscated DSP Core Against Removal Attack Using SHA-512 Based Key Encryption Hardware. |
IEEE Access |
2019 |
DBLP DOI BibTeX RDF |
|
36 | Musheer Ahmad 0002, Eesa A. Alsolami, Xing-Yuan Wang, Mohammad Najam Doja, Mirza Mohd. Sufyan Beg, Amer Awad Alzaidi |
Cryptanalysis of an Image Encryption Algorithm Based on Combined Chaos for a BAN System, and Improved Scheme Using SHA-512 and Hyperchaos. |
Symmetry |
2018 |
DBLP DOI BibTeX RDF |
|
36 | Hao Cheng 0009, Daniel Dinu, Johann Großschädl |
Efficient Implementation of the SHA-512 Hash Function for 8-Bit AVR Microcontrollers. |
SecITC |
2018 |
DBLP DOI BibTeX RDF |
|
36 | Can Ge, Lingzhi Xu, Weidong Qiu, Zheng Huang, Jie Guo 0011, Guozhen Liu, Zheng Gong |
Optimized Password Recovery for SHA-512 on GPUs. |
CSE/EUC (2) |
2017 |
DBLP DOI BibTeX RDF |
|
36 | Georgios Athanasiou, Harris E. Michail, George Theodoridis, Costas E. Goutis |
Optimising the SHA-512 cryptographic hash function on FPGAs. |
IET Comput. Digit. Tech. |
2014 |
DBLP DOI BibTeX RDF |
|
36 | Maria Eichlseder, Florian Mendel, Martin Schläffer |
Branching Heuristics in Differential Collision Search with Applications to SHA-512. |
IACR Cryptol. ePrint Arch. |
2014 |
DBLP BibTeX RDF |
|
36 | Hongbo Yu, Dongxia Bai |
Boomerang Attack on Step-Reduced SHA-512. |
IACR Cryptol. ePrint Arch. |
2014 |
DBLP BibTeX RDF |
|
36 | Hongbo Yu, Dongxia Bai |
Boomerang Attack on Step-Reduced SHA-512. |
Inscrypt |
2014 |
DBLP DOI BibTeX RDF |
|
36 | Maria Eichlseder, Florian Mendel, Martin Schläffer |
Branching Heuristics in Differential Collision Search with Applications to SHA-512. |
FSE |
2014 |
DBLP DOI BibTeX RDF |
|
36 | Abdulhadi Shoufan |
A fault attack on a hardware-based implementation of the secure hash algorithm SHA-512. |
ReConFig |
2013 |
DBLP DOI BibTeX RDF |
|
36 | Ignacio Algredo-Badillo, Miguel Morales-Sandoval, Claudia Feregrino Uribe, René Cumplido |
Throughput and Efficiency Analysis of Unrolled Hardware Architectures for the SHA-512 Hash Algorithm. |
ISVLSI |
2012 |
DBLP DOI BibTeX RDF |
|
36 | Shay Gueron, Simon Johnson, Jesse Walker |
SHA-512/256. |
ITNG |
2011 |
DBLP DOI BibTeX RDF |
|
36 | Shay Gueron, Simon Johnson, Jesse Walker |
SHA-512/256. |
IACR Cryptol. ePrint Arch. |
2010 |
DBLP BibTeX RDF |
|
36 | R. Kayalvizhi, R. Harihara Subramanian, R. Girish Santhosh, J. Gurubaran, Vaidehi V. |
VLSI Design and Implementation of Combined Secure Hash Algorithm SHA-512. |
CNSA |
2010 |
DBLP DOI BibTeX RDF |
|
36 | Somitra Kumar Sanadhya, Palash Sarkar 0001 |
Colliding Message Pairs for 23 and 24-step SHA-512 |
CoRR |
2008 |
DBLP BibTeX RDF |
|
36 | Imtiaz Ahmad, A. Shoba Das |
Analysis and Detection Of Errors In Implementation Of SHA-512 Algorithms On FPGAs. |
Comput. J. |
2007 |
DBLP DOI BibTeX RDF |
|
30 | Anh Tuan Hoang, Katsuhiro Yamazaki, Shigeru Oyanagi |
Three-stage pipeline implementation for SHA2 using data forwarding. |
FPL |
2008 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #56 of 56 (100 per page; Change: )
|
|