Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 224,979,790 papers from all fields of science
Search
Sign In
Create Free Account
256-bit
Known as:
256 bit
In computer architecture, 256-bit integers, memory addresses, or other data units are those that are at most 256 bits (32 octets) wide. Also, 256-bit…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
15 relations
128-bit
AVX-512
Advanced Vector Extensions
Arbitrary-precision arithmetic
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2020
2020
Combination of the Local Binary Pattern Histogram Method and SHA256 Bit in the Face Recognition System
Ellanda Purwa Wijaya
,
O. S. Sitompul
,
H. Mawengkang
2020
Corpus ID: 212431091
Recognition face technology is very fast at this time, there are many face recognition applications that have been applied to…
Expand
2019
2019
Implementation QR Code Biometric Authentication for Online Payment
Agostinho Marques Ximenes
,
S. Sukaridhoto
,
+5 authors
Ezharul Islam
Asia Pacific Symposium on Intelligent and…
2019
Corpus ID: 208209913
Based on the Indonesian of Statistics the level of society people in 2019 is grow up. Based on data, the bank conducted a…
Expand
2018
2018
On a Rank-Metric Code-Based Cryptosystem with Small Key Size
Julian Renner
,
S. Puchinger
,
A. Wachter-Zeh
IACR Cryptology ePrint Archive
2018
Corpus ID: 54476057
A repair of the Faure-Loidreau (FL) public-key code-based cryptosystem is proposed. The FL cryptosystem is based on the hardness…
Expand
2012
2012
A secure and efficient cryptographic hash function based on NewFORK-256
Harshvardhan Tiwari
,
Krishna Asawa
2012
Corpus ID: 58980709
2012
2012
ANALYZING THE PERFORMANCE OF CARRY TREE ADDERS BASED ON FPGA’S
R. Kiran
,
Sunitha Nampally
2012
Corpus ID: 212563784
,
2011
2011
A wheel-switch chaotic system for image encryption
Yue Wu
,
J. Noonan
,
S. Agaian
Proceedings International Conference on System…
2011
Corpus ID: 12649466
Because of high sensitivity for initial values and random-like behaviors, chaotic systems are widely used in image encryption…
Expand
2011
2011
Reliable and efficient PUF-based key generation using pattern matching
Helper Data
,
Seed
2011
Corpus ID: 141055904
—We describe a novel and efficient method to reliably provision and re-generate a finite and exact sequence of bits, for use with…
Expand
2009
2009
Large Key Sizes and the Security of Password-Based Cryptography
K. D. Boklan
International Journal of Information Security and…
2009
Corpus ID: 16591389
We expose a potential vulnerability in the common use of password-based cryptography. When employing a user-chosen password to…
Expand
2004
2004
Performance evaluation of WTLS handshake protocol using RSA and elliptic curve cryptosystems
Burak Bayoglu
2004
Corpus ID: 60245228
WTLS (Wireless Transport Layer Security) is the security protocol designed for WAP (Wireless Application Protocol) protocol stack…
Expand
Review
2001
Review
2001
Embedded DRAM built in self test and methodology for test insertion
P. Jakobsen
,
J. Dreibelbis
,
+5 authors
George M. Belansek
Proceedings International Test Conference (Cat…
2001
Corpus ID: 3224128
As ASIC technologies expand into new markets, the need for dense embedded memory grows. To accommodate this increased demand…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE