Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 234,500,033 papers from all fields of science
Search
Sign In
Create Free Account
SHA-2
Known as:
SHA 224
, Sha 512
, SHA384
Expand
SHA-2 (Secure Hash Algorithm 2) is a set of cryptographic hash functions designed by the National Security Agency (NSA). SHA stands for Secure Hash…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Avalanche effect
Biclique attack
Birthday attack
Bitwise operation
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Fingerprint watermarking with tamper localization and exact recovery using multi-level authentication
K. Wei
,
Siau-Chuin Liew
2018
Corpus ID: 59370253
This paper presents the tamper localization and exact recovery using multi-level authentication in fingerprint watermarking. The…
Expand
2015
2015
Comparative Analysis of Energy Usage of Hash Functions in Secured Wireless Sensor Networks
Henry Nunoo-Mensah
,
K. Boateng
,
J. Gadze
2015
Corpus ID: 1671033
Security in wireless sensor network (WSN) has become an increasing necessity due to the diverse application areas being…
Expand
2012
2012
Hardware Performance Evaluation of SHA-3 Candidate Algorithms
Y. Jararweh
,
L. Tawalbeh
,
Hala Tawalbeh
,
Abidalrahman Mohammad
J. Information Security
2012
Corpus ID: 8263871
Secure Hashing Algorithms (SHA) showed a significant importance in today’s information security applications. The National…
Expand
2012
2012
Authentication for Online Voting Using Steganography and Biometrics
L. Paul
2012
Corpus ID: 17456761
Abstract— In this paper an online voting authentication technique is proposed which provides biometric as well as password…
Expand
2011
2011
Security Analysis of TrueCrypt 7 . 0 a with an Attack on the Keyfile Algorithm
2011
Corpus ID: 16033543
Preface…
Expand
2010
2010
Uniform Evaluation of Hardware Implementations of the Round-Two SHA-3 Candidates
S. Tillich
,
Martin Feldhofer
,
Mario Kirschbaum
,
Thomas Plos
,
Jörn-Marc Schmidt
,
Alexander Szekely
2010
Corpus ID: 10653970
We describe our high-speed hardware modules for the 14 candidates of the second evaluation round of the SHA-3 hash function…
Expand
2010
2010
Comprehensive Comparison of Hardware Performance of Fourteen Round 2 SHA-3 Candidates with 512-bit Outputs Using Field Programmable Gate Arrays
K. Gaj
,
Ekawat Homsirikamol
2010
Corpus ID: 15595525
In this paper, we extend our evaluation of the hardware performance of 14 Round 2 SHA-3 candidates, accepted for the presentation…
Expand
2010
2010
On The Impact of Target Technology in SHA-3 Hardware Benchmark Rankings
Xu Guo
,
Sinan Huang
,
L. Nazhandali
,
P. Schaumont
IACR Cryptology ePrint Archive
2010
Corpus ID: 14465778
Both FPGAs and ASICs are widely used as the technology for comparing SHA-3 hardware benchmarking process. However, the im- pact…
Expand
2009
2009
A design of security protocol using hybrid encryption technique (AES-Rijndael and RSA)
E. Ramaraj
,
S. Karthikeyan
,
M. Hemalatha
2009
Corpus ID: 64879392
This paper aims to design the new security protocol using hybrid encryption technique for on line transaction. The hybrid…
Expand
2007
2007
High-speed & Low Area Hardware Architectures of the Whirlpool Hash Function
Máire O’Neill
,
C. McIvor
J. VLSI Signal Process.
2007
Corpus ID: 207252595
High-speed and low area hardware architectures of the Whirlpool hash function are presented in this paper. A full Look-up Table…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required