Skip to search formSkip to main contentSkip to account menu

SHA-2

Known as: SHA 224, Sha 512, SHA384 
SHA-2 (Secure Hash Algorithm 2) is a set of cryptographic hash functions designed by the National Security Agency (NSA). SHA stands for Secure Hash… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
This paper presents the tamper localization and exact recovery using multi-level authentication in fingerprint watermarking. The… 
2015
2015
Security in wireless sensor network (WSN) has become an increasing necessity due to the diverse application areas being… 
2012
2012
Secure Hashing Algorithms (SHA) showed a significant importance in today’s information security applications. The National… 
2012
2012
 Abstract— In this paper an online voting authentication technique is proposed which provides biometric as well as password… 
2010
2010
We describe our high-speed hardware modules for the 14 candidates of the second evaluation round of the SHA-3 hash function… 
2010
2010
In this paper, we extend our evaluation of the hardware performance of 14 Round 2 SHA-3 candidates, accepted for the presentation… 
2010
2010
Both FPGAs and ASICs are widely used as the technology for comparing SHA-3 hardware benchmarking process. However, the im- pact… 
2009
2009
This paper aims to design the new security protocol using hybrid encryption technique for on line transaction. The hybrid… 
2007
2007
High-speed and low area hardware architectures of the Whirlpool hash function are presented in this paper. A full Look-up Table…