-
1
Carry-based Differential Power Analysis (CDPA) and its Application to Attacking HMAC-SHA-2
Published 2023-06-01Subjects: Get full text
Article -
2
Engineering of Antimicrobial Surfaces by Using Temporin Analogs to Tune the Biocidal/antiadhesive Effect
Published 2019-02-01Subjects: “…temporin-SHa…”
Get full text
Article -
3
A High-Performance Multimem SHA-256 Accelerator for Society 5.0
Published 2021-01-01Subjects: “…SHA-256…”
Get full text
Article -
4
Synthesis of Second-Generation Analogs of Temporin-SHa Peptide Having Broad-Spectrum Antibacterial and Anticancer Effects
Published 2024-08-01Subjects: Get full text
Article -
5
Rancang Bangun Teknologi Blockchain Pada Sistem Keamanan Data Jaringan Sensor
Published 2021-08-01Subjects: Get full text
Article -
6
Parallel and High Speed Hashing in GPU for Telemedicine Applications
Published 2018-01-01Subjects: Get full text
Article -
7
A Flexible Framework for Exploring, Evaluating, and Comparing SHA-2 Designs
Published 2019-01-01Subjects: Get full text
Article -
8
Misreport of burns as a result of ‘coining’, Gua sha; inherent harms from publication and ongoing citation of false facts
Published 2023-06-01Subjects: Get full text
Article -
9
Two Factor Authentication Based Generated One Time Password
Published 2015-03-01Subjects: Get full text
Article -
10
SHA-2 Acceleration Meeting the Needs of Emerging Applications: A Comparative Survey
Published 2020-01-01Subjects: Get full text
Article -
11
-
12
Optimization of PBKDF2 Using HMAC-SHA2 and HMAC-LSH Families in CPU Environment
Published 2021-01-01Subjects: Get full text
Article -
13
Penerapan Keamanan WSN Berbasis Algoritma RSA 2048 dan SHA-3 pada Pemantauan Suhu
Published 2021-01-01Subjects: Get full text
Article -
14
Authenticated and Secure End-To-End Communication Channel Using SMS Messages
Published 2009-03-01Subjects: Get full text
Article -
15
SHA-256 Hardware Proposal for IoT Devices in the Blockchain Context
Published 2024-06-01Subjects: Get full text
Article -
16
A Lightweight authentication scheme for IoT against Rogue Base Station Attacks
Published 2022-08-01Subjects: Get full text
Article -
17
Double SHA-256 Hardware Architecture With Compact Message Expander for Bitcoin Mining
Published 2020-01-01Subjects: Get full text
Article -
18
Hybrid Chaotic-Based PRNG for Secure Cryptography Applications
Published 2023-06-01Subjects: Get full text
Article -
19
Detection of malware in downloaded files using various machine learning models
Published 2023-03-01Subjects: Get full text
Article -
20
Optimizing FPGA Resource Allocation for SHA-3 Using DSP48 and Pipelining Techniques
Published 2025-01-01Subjects: “…sha-3…”
Get full text
Article