Journal articles on the topic 'Hash function SHA-1'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Hash function SHA-1.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Suhaili, Shamsiah binti, and Takahiro Watanabe. "High-Throughput of SHA-256 Hash Function with Unfolding Transformation." Global Journal of Engineering and Technology Review Vol.4 (4) October-December. 2019 4, no. 4 (2019): 73–81. http://dx.doi.org/10.35609/gjetr.2019.4.4(1).
Full textKorona, Mateusz, Paweł Szumełda, Mariusz Rawski, and Artur Janicki. "Comparison of Hash Functions for Network Traffic Acquisition Using a Hardware-Accelerated Probe." Electronics 11, no. 11 (2022): 1688. http://dx.doi.org/10.3390/electronics11111688.
Full textProf., Pawan Kumar* Dr. Harsh Dev. "ALGORITHMIC DESIGN AND ANALYSIS OF CRYPTOGRAPHIC SHA-256 HASH FUNCTION WITH PROPOSED SHA-288 HASH MODEL." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 6, no. 2 (2017): 160–64. https://doi.org/10.5281/zenodo.290136.
Full textTiwari, Harshvardhan. "Merkle-Damgård Construction Method and Alternatives." Journal of information and organizational sciences 41, no. 2 (2017): 283–304. http://dx.doi.org/10.31341/jios.41.2.9.
Full textMalviya, Iti, and Tejasvini Chetty. "Performance and Limitation Review of Secure Hash Function Algorithm." International Journal on Recent and Innovation Trends in Computing and Communication 7, no. 6 (2019): 48–51. http://dx.doi.org/10.17762/ijritcc.v7i6.5323.
Full textKahri, Fatma, Hassen Mestiri, Belgacem Bouallegue, and Mohsen Machhout. "High Speed FPGA Implementation of Cryptographic KECCAK Hash Function Crypto-Processor." Journal of Circuits, Systems and Computers 25, no. 04 (2016): 1650026. http://dx.doi.org/10.1142/s0218126616500262.
Full textM. Al-Nawashi, Malek, Obaida M. Al-hazaimeh, Isra S. Al-Qasrawi, Ashraf A. Abu-Ein, and Monther H. Al-Bsool. "Analysis and Evolution of SHA-1 Algorithm - Analytical Technique." International journal of Computer Networks & Communications 16, no. 3 (2024): 89–101. http://dx.doi.org/10.5121/ijcnc.2024.16306.
Full textKumar, Umesh, and V. Ch Venkaiah. "An Efficient Message Authentication Code Based on Modified MD5-384 Bits Hash Function and Quasigroup." International Journal of Cloud Applications and Computing 12, no. 1 (2022): 1–27. http://dx.doi.org/10.4018/ijcac.308275.
Full textRechberger, Christian, and Vincent Rijmen. "New Results on NMAC/HMAC when Instantiated with Popular Hash Functions." JUCS - Journal of Universal Computer Science 14, no. (3) (2008): 347–76. https://doi.org/10.3217/jucs-014-03-0347.
Full textAli Al-Hammadi, Yousef, and Mohamed Fadl Idris Fadl. "Reducing Hash Function Complexity: MD5 and SHA-1 as Examples." International Journal of Mathematical Sciences and Computing 5, no. 1 (2019): 1–17. http://dx.doi.org/10.5815/ijmsc.2019.01.01.
Full textLEE, Je-Hoon, Sang-Choon KIM, and Young-Jun SONG. "High-Speed FPGA Implementation of the SHA-1 Hash Function." IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E94-A, no. 9 (2011): 1873–76. http://dx.doi.org/10.1587/transfun.e94.a.1873.
Full textZellagui, Amine, Naima Hadj-Said, and Adda Ali-Pacha. "Secure MD4 Hash Function Using Henon." Malaysian Journal of Computing and Applied Mathematics 3, no. 2 (2020): 73–80. http://dx.doi.org/10.37231/myjcam.2020.3.2.56.
Full textTri Ade Nia, Rudyanto Ompungsunggu, Arrant Ardi Sianipar, Jesimanta Jesimanta, and Yoramo Waruwu. "Merkle-Damgård as the Foundation of Hash Cryptography: A Study of Advantages and Limitations." Jurnal Teknik Indonesia 3, no. 01 (2024): 24–29. https://doi.org/10.58471/ju-ti.v3i01.652.
Full textM. Nasution, Rezky. "Implementasi Metode Secure Hash Algorithm (SHA-1) Untuk Mendeteksi Orisinalitas File Audio." Bulletin of Computer Science Research 2, no. 3 (2022): 73–84. http://dx.doi.org/10.47065/bulletincsr.v2i3.140.
Full textSideris, Argyrios, Theodora Sanida, and Minas Dasygenis. "A Novel Hardware Architecture for Enhancing the Keccak Hash Function in FPGA Devices." Information 14, no. 9 (2023): 475. http://dx.doi.org/10.3390/info14090475.
Full textSilalahi, Lisnayani, and Anita Sindar. "Penerapan Kriptografi Keamanan Data Administrasi Kependudukan Desa Pagar Jati Menggunakan SHA-1." Jurnal Nasional Komputasi dan Teknologi Informasi (JNKTI) 3, no. 2 (2020): 182–86. http://dx.doi.org/10.32672/jnkti.v3i2.2413.
Full textSafaryan, Olga, Larissa Cherckesova, Nikita Lyashenko, et al. "Modern Hash Collision CyberAttacks and Methods of Their Detection and Neutralization." Journal of Physics: Conference Series 2131, no. 2 (2021): 022099. http://dx.doi.org/10.1088/1742-6596/2131/2/022099.
Full textToruan, Dermawan Lumban. "Implementasi Metode Secure Hash Algorithm-1 Untuk Mendeteksi Keaslian File Dokumen." Journal of Information System Research (JOSH) 2, no. 4 (2021): 227–34. http://dx.doi.org/10.47065/josh.v2i4.568.
Full textLin, Chu-Hsing, Jung-Chun Liu, Joy Iong-Zong Chen, and Tien-Pin Chu. "On the Performance of Cracking Hash Function SHA-1 Using Cloud and GPU Computing." Wireless Personal Communications 109, no. 1 (2019): 491–504. http://dx.doi.org/10.1007/s11277-019-06575-9.
Full textCherckesova, Larissa V., Olga A. Safaryan, Nikita G. Lyashenko, and Denis A. Korochentsev. "Developing a New Collision-Resistant Hashing Algorithm." Mathematics 10, no. 15 (2022): 2769. http://dx.doi.org/10.3390/math10152769.
Full textHuang, Qingye, Linqing Huang, Shuting Cai, Xiaoming Xiong, and Hui Zhang. "On a Symmetric Image Cryptosystem Based on a Novel One-Dimensional Chaotic System and Banyan Network." Mathematics 11, no. 21 (2023): 4411. http://dx.doi.org/10.3390/math11214411.
Full textSevin, Abdullah, and Ünal Çavuşoğlu. "Design and Performance Analysis of a SPECK-Based Lightweight Hash Function." Electronics 13, no. 23 (2024): 4767. https://doi.org/10.3390/electronics13234767.
Full textNuida, Koji, Takuro Abe, Shizuo Kaji, Toshiaki Maeno, and Yasuhide Numata. "A Mathematical Problem for Security Analysis of Hash Functions and Pseudorandom Generators." International Journal of Foundations of Computer Science 26, no. 02 (2015): 169–94. http://dx.doi.org/10.1142/s0129054115500100.
Full textNazal, Muhammad Asghar, Reza Pulungan, and Mardhani Riasetiawan. "Data Integrity and Security using Keccak and Digital Signature Algorithm (DSA)." IJCCS (Indonesian Journal of Computing and Cybernetics Systems) 13, no. 3 (2019): 273. http://dx.doi.org/10.22146/ijccs.47267.
Full textEl Bakrawy, Lamiaa M., and Neveen I. Ghali. "An Improved Hashing Function for Human Authentication System." International Journal of Computer Vision and Image Processing 3, no. 2 (2013): 32–42. http://dx.doi.org/10.4018/ijcvip.2013040103.
Full textSaeed, Ahmed Sardar M., and Loay E. George. "Fingerprint-Based Data Deduplication Using a Mathematical Bounded Linear Hash Function." Symmetry 13, no. 11 (2021): 1978. http://dx.doi.org/10.3390/sym13111978.
Full textLong, Nguyễn Văn. "Phân tích các thành phần mật mã trong hoán vị Keccak-p". Journal of Science and Technology on Information security 8, № 2 (2020): 34–45. http://dx.doi.org/10.54654/isj.v8i2.31.
Full textAl-Adhami, Ayad, Rajaa K. Hasoun, Ekhlas K. Gbashi, and Soukaena Hassan. "A secure communication protocol for civil drones." Indonesian Journal of Electrical Engineering and Computer Science 27, no. 3 (2022): 1490–501. https://doi.org/10.11591/ijeecs.v27.i3.pp1490-1501.
Full textHuang, Si-Cheng, Shan Huang, Hua-Lei Yin, Qing-Li Ma, and Ze-Jie Yin. "High-Speed Variable Polynomial Toeplitz Hash Algorithm Based on FPGA." Entropy 25, no. 4 (2023): 642. http://dx.doi.org/10.3390/e25040642.
Full textGhsuoon B. Roomi. "Improving and Protecting the Privacy of Data Security Using Blake2 Algorithm." Journal of Information Systems Engineering and Management 10, no. 5s (2025): 281–93. https://doi.org/10.52783/jisem.v10i5s.625.
Full textBudiman, Fikri, and De Setiadi. "A Combination of Block-Based Chaos with Dynamic Iteration Pattern and Stream Cipher for Color Image Encryption." International Journal of Intelligent Engineering and Systems 13, no. 6 (2020): 131–41. http://dx.doi.org/10.22266/ijies2020.1231.12.
Full textFu, Shihui, and Guang Gong. "Polaris: Transparent Succinct Zero-Knowledge Arguments for R1CS with Efficient Verifier." Proceedings on Privacy Enhancing Technologies 2022, no. 1 (2021): 544–64. http://dx.doi.org/10.2478/popets-2022-0027.
Full textLi, Xiaochao, Kongcheng Wu, Qi Zhang, Shaoyu Lin, Yihui Chen, and Shen Yuong Wong. "A High Throughput and Pipelined Implementation of the LUKS on FPGA." Journal of Circuits, Systems and Computers 29, no. 05 (2019): 2050075. http://dx.doi.org/10.1142/s0218126620500759.
Full textWang, Jianxin, Zifan Xu, Xiangze Chang, Chaoen Xiao, and Lei Zhang. "Design and Implementation of USB Key System Based on Dual-Factor Identity Authentication Protocol." Journal of Electronic Research and Application 8, no. 5 (2024): 161–67. http://dx.doi.org/10.26689/jera.v8i5.8398.
Full textZhang, Guoyin, Liang Kou, Liguo Zhang, Chao Liu, Qingan Da, and Jianguo Sun. "A New Digital Watermarking Method for Data Integrity Protection in the Perception Layer of IoT." Security and Communication Networks 2017 (2017): 1–12. http://dx.doi.org/10.1155/2017/3126010.
Full textV, Elamurugu, and J. Evanjaline D. "DynAuthRoute: Dynamic Security for Wireless Sensor Networks." Indian Journal of Science and Technology 17, no. 13 (2024): 1323–30. https://doi.org/10.17485/IJST/v17i13.49.
Full textElamurugu, V., and D. J. Evanjaline. "DynAuthRoute: Dynamic Security for Wireless Sensor Networks." Indian Journal Of Science And Technology 17, no. 13 (2024): 1323–30. http://dx.doi.org/10.17485/ijst/v17i13.49.
Full textBenjamin, Thomas S., Jeffery A. Eitel, Jesse Elwell, Dmitry Evtyushkin, Abhrajit Ghosh, and Angelo Sapello. "Computing with Time: Microarchitectural Weird Machines." Communications of the ACM 67, no. 12 (2024): 87–95. http://dx.doi.org/10.1145/3610722.
Full textJasek, Roman. "SHA-1 and MD5 Cryptographic Hash Functions: Security Overview." Communications - Scientific letters of the University of Zilina 17, no. 1 (2015): 73–80. http://dx.doi.org/10.26552/com.c.2015.1.73-80.
Full textTawfeeq, Firas Ghanim, and Alaa M. Abdul-Hadi. "Improved throughput of Elliptic Curve Digital Signature Algorithm (ECDSA) processor implementation over Koblitz curve k-163 on Field Programmable Gate Array (FPGA)." Baghdad Science Journal 17, no. 3(Suppl.) (2020): 1029. http://dx.doi.org/10.21123/bsj.2020.17.3(suppl.).1029.
Full textBoyanov, Petar. "PRACTICAL APPLICATIONS OF HASH FUNCTIONS MD5, SHA-1, AND SHA-256 USING VARIOUS SOFTWARE TOOLS TO VERIFY THE INTEGRITY OF FILES." Journal Scientific and Applied Research 27, no. 1 (2024): 120–37. http://dx.doi.org/10.46687/jsar.v27i1.413.
Full textATHANASIOU, GEORGE S., GEORGE THEODORIDIS, COSTAS E. GOUTIS, HARRIS E. MICHAIL, and TAKIS KASPARIS. "A SYSTEMATIC FLOW FOR DEVELOPING TOTALLY SELF-CHECKING ARCHITECTURES FOR SHA-1 AND SHA-2 CRYPTOGRAPHIC HASH FAMILIES." Journal of Circuits, Systems and Computers 22, no. 06 (2013): 1350049. http://dx.doi.org/10.1142/s0218126613500497.
Full textMichail, Harris E., George S. Athanasiou, Vasileios I. Kelefouras, George Theodoridis, Thanos Stouraitis, and Costas E. Goutis. "Area-Throughput Trade-Offs for SHA-1 and SHA-256 Hash Functions’ Pipelined Designs." Journal of Circuits, Systems and Computers 25, no. 04 (2016): 1650032. http://dx.doi.org/10.1142/s0218126616500328.
Full textMichail, Harris E., George S. Athanasiou, George Theodoridis, Andreas Gregoriades, and Costas E. Goutis. "Design and implementation of totally-self checking SHA-1 and SHA-256 hash functions’ architectures." Microprocessors and Microsystems 45 (September 2016): 227–40. http://dx.doi.org/10.1016/j.micpro.2016.05.011.
Full textParab, Sejal. "A Review on Cryptography Using SHA Algorithm." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 06 (2025): 1–9. https://doi.org/10.55041/ijsrem50103.
Full textRedžepagić, Jasmin, Damir Regvart, Hrvoje Rudeš, and Robert Petrunić. "Vulnerabilities in cryptographic hash functions: A practical study of hash cracking techniques and security implications." Edelweiss Applied Science and Technology 9, no. 2 (2025): 2307–17. https://doi.org/10.55214/25768484.v9i2.5072.
Full textKhan, Burhan Ul Islam, Rashidah Funke Olanrewaju, Malik Arman Morshidi, Roohie Naaz Mir, Miss Laiha Binti Mat Kiah, and Abdul Mobeen Khan. "EVOLUTION AND ANALYSIS OF SECURED HASH ALGORITHM (SHA) FAMILY." Malaysian Journal of Computer Science 35, no. 3 (2022): 179–200. http://dx.doi.org/10.22452/mjcs.vol35no3.1.
Full textSobti, Rajeev, and Geetha Ganesan. "Performance Evaluation of SHA-3 Final Round Candidate Algorithms on ARM Cortex–M4 Processor." International Journal of Information Security and Privacy 12, no. 1 (2018): 63–73. http://dx.doi.org/10.4018/ijisp.2018010106.
Full textAbdoun, Nabil, Safwan El Assad, Thang Manh Hoang, Olivier Deforges, Rima Assaf, and Mohamad Khalil. "Designing Two Secure Keyed Hash Functions Based on Sponge Construction and the Chaotic Neural Network." Entropy 22, no. 9 (2020): 1012. http://dx.doi.org/10.3390/e22091012.
Full textMichail, H., A. Kakarountas, A. Milidonis, and C. Goutis. "Efficient FPGA Implementation of Novel Cryptographic Hashing Core." Computing Letters 2, no. 1-2 (2006): 21–27. http://dx.doi.org/10.1163/157404006777491909.
Full text