Academic literature on the topic 'Hash function SHA-1'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Hash function SHA-1.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Hash function SHA-1"
Suhaili, Shamsiah binti, and Takahiro Watanabe. "High-Throughput of SHA-256 Hash Function with Unfolding Transformation." Global Journal of Engineering and Technology Review Vol.4 (4) October-December. 2019 4, no. 4 (2019): 73–81. http://dx.doi.org/10.35609/gjetr.2019.4.4(1).
Full textKorona, Mateusz, Paweł Szumełda, Mariusz Rawski, and Artur Janicki. "Comparison of Hash Functions for Network Traffic Acquisition Using a Hardware-Accelerated Probe." Electronics 11, no. 11 (2022): 1688. http://dx.doi.org/10.3390/electronics11111688.
Full textProf., Pawan Kumar* Dr. Harsh Dev. "ALGORITHMIC DESIGN AND ANALYSIS OF CRYPTOGRAPHIC SHA-256 HASH FUNCTION WITH PROPOSED SHA-288 HASH MODEL." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 6, no. 2 (2017): 160–64. https://doi.org/10.5281/zenodo.290136.
Full textTiwari, Harshvardhan. "Merkle-Damgård Construction Method and Alternatives." Journal of information and organizational sciences 41, no. 2 (2017): 283–304. http://dx.doi.org/10.31341/jios.41.2.9.
Full textMalviya, Iti, and Tejasvini Chetty. "Performance and Limitation Review of Secure Hash Function Algorithm." International Journal on Recent and Innovation Trends in Computing and Communication 7, no. 6 (2019): 48–51. http://dx.doi.org/10.17762/ijritcc.v7i6.5323.
Full textKahri, Fatma, Hassen Mestiri, Belgacem Bouallegue, and Mohsen Machhout. "High Speed FPGA Implementation of Cryptographic KECCAK Hash Function Crypto-Processor." Journal of Circuits, Systems and Computers 25, no. 04 (2016): 1650026. http://dx.doi.org/10.1142/s0218126616500262.
Full textM. Al-Nawashi, Malek, Obaida M. Al-hazaimeh, Isra S. Al-Qasrawi, Ashraf A. Abu-Ein, and Monther H. Al-Bsool. "Analysis and Evolution of SHA-1 Algorithm - Analytical Technique." International journal of Computer Networks & Communications 16, no. 3 (2024): 89–101. http://dx.doi.org/10.5121/ijcnc.2024.16306.
Full textKumar, Umesh, and V. Ch Venkaiah. "An Efficient Message Authentication Code Based on Modified MD5-384 Bits Hash Function and Quasigroup." International Journal of Cloud Applications and Computing 12, no. 1 (2022): 1–27. http://dx.doi.org/10.4018/ijcac.308275.
Full textRechberger, Christian, and Vincent Rijmen. "New Results on NMAC/HMAC when Instantiated with Popular Hash Functions." JUCS - Journal of Universal Computer Science 14, no. (3) (2008): 347–76. https://doi.org/10.3217/jucs-014-03-0347.
Full textAli Al-Hammadi, Yousef, and Mohamed Fadl Idris Fadl. "Reducing Hash Function Complexity: MD5 and SHA-1 as Examples." International Journal of Mathematical Sciences and Computing 5, no. 1 (2019): 1–17. http://dx.doi.org/10.5815/ijmsc.2019.01.01.
Full textDissertations / Theses on the topic "Hash function SHA-1"
Beran, Martin. "Elektronická podatelna VUT 2." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2007. http://www.nusl.cz/ntk/nusl-412777.
Full textLee, Ting-Yi, and 李庭怡. "Hardware design and implementation of hash function SHA-1." Thesis, 2002. http://ndltd.ncl.edu.tw/handle/28194991076214709941.
Full textGalaczová, Barbora. "Bezpečnost a použitelnost základních hashovacích funkcí, zejména MD-5, SHA-1 a SHA-2." Master's thesis, 2011. http://www.nusl.cz/ntk/nusl-313898.
Full textChu, Tien-Pin, and 朱田彬. "On the Performance of Cracking Hash Function SHA-1 Using Cloud and GPU Technologies." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/v5g3v6.
Full textΕμερετλής, Ανδρέας. "Μεθοδολογία και υλοποίηση secure hash αλγορίθμων σε FPGA". Thesis, 2012. http://hdl.handle.net/10889/5622.
Full textZimmermannová, Jana. "Vývoj a využití hašovacích funkcí při zpracování informací." Master's thesis, 2012. http://www.nusl.cz/ntk/nusl-304187.
Full textΜιχαήλ, Χαράλαμπος. "Βελτιστοποίηση επαναπροσδιοριζομένων αρχιτεκτονικών για απόδοση και κατανάλωση ενέργειας σε κρυπτογραφικές εφαρμογές κυριαρχούμενες από δεδομένα". Thesis, 2009. http://nemertes.lis.upatras.gr/jspui/handle/10889/2829.
Full textBooks on the topic "Hash function SHA-1"
Shengelia, Revaz. Modern Economics. Universal, Georgia, 2021. http://dx.doi.org/10.36962/rsme012021.
Full textBook chapters on the topic "Hash function SHA-1"
Kim, Mooseop, Jaecheol Ryou, and Sungik Jun. "Compact Implementation of SHA-1 Hash Function for Mobile Trusted Module." In Information Security Applications. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-00306-6_22.
Full textMichail, H. E., A. P. Kakarountas, George N. Selimis, and Costas E. Goutis. "Optimizing SHA-1 Hash Function for High Throughput with a Partial Unrolling Study." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11556930_60.
Full textLien, Roar, Tim Grembowski, and Kris Gaj. "A 1 Gbit/s Partially Unrolled Architecture of Hash Functions SHA-1 and SHA-512." In Topics in Cryptology – CT-RSA 2004. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-24660-2_25.
Full textPramstaller, Norbert, Christian Rechberger, and Vincent Rijmen. "Impact of Rotations in SHA-1 and Related Hash Functions." In Selected Areas in Cryptography. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11693383_18.
Full textGrembowski, Tim, Roar Lien, Kris Gaj, et al. "Comparative Analysis of the Hardware Implementations of Hash Functions SHA-1 and SHA-512." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-45811-5_6.
Full textKitsos, Paris. "System-on-Chip Design of the Whirlpool Hash Function." In Handbook of Research on Wireless Security. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-899-4.ch017.
Full textQuantin Catherine, Bouzelat Hocine, and Dusserre Liliane. "A computerized record hash coding and linkage procedure to warrant epidemiological follow-up data security." In Studies in Health Technology and Informatics. IOS Press, 1997. https://doi.org/10.3233/978-1-60750-887-8-339.
Full textNandagopal, Radha, and Kristina Rother. "Case 78: Psychosocial Stressors and Management in an Adolescent with Type 2 Diabetes." In Diabetes Case Studies: Real Problems, Practical Solutions. American Diabetes Association, 2015. http://dx.doi.org/10.2337/9781580405713.78.
Full textFowler, Catherine. "‘My dearest little girl, I just got your letter and I hope that you will continue to write to me often’." In Epistolary Entanglements in Film, Media and the Visual Arts. Amsterdam University Press, 2023. http://dx.doi.org/10.5117/9789463729666_ch02.
Full textCollier, James Lincoln. "The Critics." In Jazz. Oxford University PressNew York, NY, 1993. http://dx.doi.org/10.1093/oso/9780195079432.003.0009.
Full textConference papers on the topic "Hash function SHA-1"
Kushwaha, Aditya, Shalini Vardhan, and Neeraj Goel. "Engineering MoSe2 Defects via SHI Irradiation for Improved NH3 Gas Sensing: A DFT Study." In JSAP-Optica Joint Symposia. Optica Publishing Group, 2024. https://doi.org/10.1364/jsapo.2024.18a_a35_6.
Full textWang, Guoping. "An Efficient Implementation of SHA-1 Hash Function." In 2006 IEEE International Conference on Electro/Information Technology. IEEE, 2006. http://dx.doi.org/10.1109/eit.2006.252210.
Full textKakarountas, A. P., G. Theodoridis, T. Laopoulos, and C. E. Goutis. "High-Speed FPGA Implementation of the SHA-1 Hash Function." In 2005 IEEE Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications. IEEE, 2005. http://dx.doi.org/10.1109/idaacs.2005.282972.
Full textJae-woon Kim, Hu-ung Lee, and Youjip Won. "Design for high throughput SHA-1 hash function on FPGA." In 2012 Fourth International Conference on Ubiquitous and Future Networks (ICUFN). IEEE, 2012. http://dx.doi.org/10.1109/icufn.2012.6261737.
Full text"On the Development of Totally Self-checking Hardware Design for the SHA-1 Hash Function." In International Conference on Security and Cryptography. SciTePress - Science and and Technology Publications, 2012. http://dx.doi.org/10.5220/0004059302700275.
Full textDocherty, James, and Albert Koelmans. "A flexible hardware implementation of SHA-1 and SHA-2 Hash Functions." In 2011 IEEE International Symposium on Circuits and Systems (ISCAS). IEEE, 2011. http://dx.doi.org/10.1109/iscas.2011.5937967.
Full textAl-Odat, Zeyad, and Samee Khan. "The Sponge Structure Modulation Application to Overcome the Security Breaches for the MD5 and SHA-1 Hash Functions." In 2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC). IEEE, 2019. http://dx.doi.org/10.1109/compsac.2019.00119.
Full textKester, John J., William R. White, and Paul J. Wolf. "Harmonic generation in thin film doped silica waveguides." In OSA Annual Meeting. Optica Publishing Group, 1992. http://dx.doi.org/10.1364/oam.1992.tup2.
Full textYeh, Chao Y., J. C. Diels, Feiling Wang, and Adam Wu. "Nonlinear-optical properties of thin films." In OSA Annual Meeting. Optica Publishing Group, 1990. http://dx.doi.org/10.1364/oam.1990.tud6.
Full textLin, J. T., R. E. McKinney, S. L. Savrda, and J. Montgomery. "Optical coupling techniques to match laser sources to nonlinear crystals." In OSA Annual Meeting. Optica Publishing Group, 1987. http://dx.doi.org/10.1364/oam.1987.wr1.
Full textReports on the topic "Hash function SHA-1"
Chou, Roger, Rongwei Fu, Tracy Dana, Miranda Pappas, Erica Hart, and Kimberly M. Mauer. Interventional Treatments for Acute and Chronic Pain: Systematic Review. Agency for Healthcare Research and Quality (AHRQ), 2021. http://dx.doi.org/10.23970/ahrqepccer247.
Full textChen, Gengbin, Tuo Lin, Manfeng Wu, et al. Effects of repetitive transcranial magnetic stimulation on upper-limb and finger function in stroke patients: a systematic review and meta-analysis of randomized controlled trials. INPLASY - International Platform of Registered Systematic Review and Meta-analysis Protocols, 2022. http://dx.doi.org/10.37766/inplasy2022.5.0121.
Full textMacFarlane, Andrew. 2021 medical student essay prize winner - A case of grief. Society for Academic Primary Care, 2021. http://dx.doi.org/10.37361/medstudessay.2021.1.1.
Full text