Showing 1 - 20 results of 320 for search '"SHA-3"', query time: 0.67s Refine Results
  1. 1

    Fast Implementation of SHA-3 in GPU Environment by Hojin Choi, Seog Chung Seo

    Published 2021-01-01
    Subjects: “…Secure Hash Algorithm (SHA)-3…”
    Get full text
    Article
  2. 2
  3. 3
  4. 4

    Hash function of finalist SHA-3: analysis study by Alshaikhli, Imad Fakhri Taha, Alahmad, Mohammad A., Munthir, Khansaa

    Published 2013
    “…Therefore, the goal of the NIST contenders in SHA-3 between the hash functions is to be chosen as the winner in the end of 2012, and the beginning of 2013. …”
    Get full text
    Article
  5. 5
  6. 6

    Practical collision attacks against round-reduced SHA-3 by Guo, Jian, Liao, Guohong, Liu, Guozhen, Liu, Meicheng, Qiao, Kexin, Song, Ling

    Published 2019
    “…The Keccak hash function is the winner of the SHA-3 competition (2008–2012) and became the SHA-3 standard of NIST in 2015. …”
    Get full text
    Get full text
    Journal Article
  7. 7

    Hashing technique based on SHA-3 using chaotic maps1 by A. V. Sidorenko, M. S. Shishko

    Published 2020-03-01
    “…Performance testing showed 60 % enhancement in comparison with plain SHA-3.…”
    Get full text
    Article
  8. 8
  9. 9
  10. 10

    Improving the security of mobile IPV6 signalling using KECCAK / SHA-3 by Supriyanto Praptodiyono, Teguh Firmansyah, Raja Kumar Murugesan, Mudrik Alaydrus, Randy Aprilia, Leau, Yu-Beng

    Published 2021
    “…The experimental result showed that the SHA-3 algorithm could fulfil the requirements. It can enhance security performance and, at the same time, does not lengthen the authentication time significantly.…”
    Get full text
    Get full text
    Article
  11. 11

    Compact Hardware Implementation of a SHA-3 Core for Wireless Body Sensor Networks by Yi Yang, Debiao He, Neeraj Kumar, Sherali Zeadally

    Published 2018-01-01
    “…We evaluate the sensor area of the proposed SHA-3 implementation and compare it with other recently proposed hardware implementations of SHA-3. …”
    Get full text
    Article
  12. 12
  13. 13

    Rtl Implementation Of Secure Hash Algorithm 3 (Sha-3) Towards Smaller Area by Lim , Yen Ruen

    Published 2017
    “…The objective of this project is to design a synthesizable SHA-3 with 256-bits hash output and 1600-bits state array with lower area compared to Intel Microelectronic SHA-3. …”
    Get full text
    Thesis
  14. 14
  15. 15
  16. 16
  17. 17

    Analysis of the Possibility of Using Selected Hash Functions Submitted for the SHA-3 Competition in the SDEx Encryption Method by Artur Hłobaż

    Published 2022-03-01
    “…The paper presents analysis of the possibility of using selected hash functions submitted for the SHA-3 competition in the SDEx encryption method. …”
    Get full text
    Article
  18. 18
  19. 19

    Data Security Model Employing Hyperelliptic Curve Cryptography (HECC) and Secure Hash Algorithm-3 (Sha-3) in Cloud Computing by Devi Thiyagarajan, Ganesan R.

    Published 2015-07-01
    “…An efficient scheme to provide data security, while storing data in the cloud has been proposed which makes use of Hyperelliptic curve cryptography (HECC) for encryption and decryption and Secure Hash Algorithm-3 (SHA-3) for data integrity verification. Implementation results clearly illustrate that HECC remains as a good alternative asymmetric key technique rather than ECC and RSA when securing documents in cloud.…”
    Get full text
    Article
  20. 20

    Simulation Analysis and Comparison of New Hybrid TLI-µTESLA and Variant TESLA Protocols Using SHA-2 and SHA-3 Hash Functions by Khouloud Eledlebi, Ahmed Adel Alzubaidi, Chan Yeob Yeun, Ernesto Damiani, Victor Mateu, Yousof Al-Hammadi

    Published 2022-11-01
    “…We also conducted a comparative analysis between two hash functions, SHA-2 and SHA-3, and assessed the feasibility of the proposed protocol in the forthcoming 6G technology. …”
    Get full text
    Article