Journal articles on the topic 'SHA-1'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'SHA-1.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Lee, Hu-ung, Seongjing Lee, Jae-woon Kim, and Youjip Won. "Parallelizing SHA-1." IEICE Electronics Express 12, no. 12 (2015): 20150371. http://dx.doi.org/10.1587/elex.12.20150371.
Full textBiham, Eli, Rafi Chen, and Antoine Joux. "Cryptanalysis of SHA-0 and Reduced SHA-1." Journal of Cryptology 28, no. 1 (May 31, 2014): 110–60. http://dx.doi.org/10.1007/s00145-014-9179-8.
Full textQuilala, Rogel Ladia, Ariel M. Sison, and Ruji P. Medina. "Modified SHA-1 Algorithm." Indonesian Journal of Electrical Engineering and Computer Science 11, no. 3 (September 1, 2018): 1027. http://dx.doi.org/10.11591/ijeecs.v11.i3.pp1027-1034.
Full textPrihensa, Herfin Yienda, and Khafid Ahmad. "Kajian Standar Volume 1 Sha’." Pertemuan dan Presentasi Ilmiah Standardisasi 2019 (December 27, 2019): 195–202. http://dx.doi.org/10.31153/ppis.2019.21.
Full textLee, Ji-hyun, Heon-seock Cynn, Sil-ah Choi, Tae-lim Yoon, and Hyo-jung Jeong. "Effects of Different Hip Rotations on Gluteus Medius and Tensor Fasciae Latae Muscle Activity During Isometric Side-Lying Hip Abduction." Journal of Sport Rehabilitation 22, no. 4 (November 2013): 301–7. http://dx.doi.org/10.1123/jsr.22.4.301.
Full textYeh, Yi-Shiung, Ting-Yu Huang, I.-Te Chen, and Shih-Chin Chou. "Analyze SHA-1 in message schedule." Journal of Discrete Mathematical Sciences and Cryptography 10, no. 1 (February 2007): 1–7. http://dx.doi.org/10.1080/09720529.2007.10698105.
Full textMichail, Harris E., George S. Athanasiou, Vasileios I. Kelefouras, George Theodoridis, Thanos Stouraitis, and Costas E. Goutis. "Area-Throughput Trade-Offs for SHA-1 and SHA-256 Hash Functions’ Pipelined Designs." Journal of Circuits, Systems and Computers 25, no. 04 (February 2, 2016): 1650032. http://dx.doi.org/10.1142/s0218126616500328.
Full textLee, Eun-Hee, Je-Hoon Lee, Il-Hwan Park, and Kyoung-Rok Cho. "Implementation of high-speed SHA-1 architecture." IEICE Electronics Express 6, no. 16 (2009): 1174–79. http://dx.doi.org/10.1587/elex.6.1174.
Full textQuilala, Rogel L., and Theda Flare G. Quilala. "Improved MSHA-1 algorithm with mixing method." Bulletin of Electrical Engineering and Informatics 10, no. 4 (August 1, 2021): 2144–51. http://dx.doi.org/10.11591/eei.v10i4.2366.
Full textSuhaili, Shamsiah binti, and Takahiro Watanabe. "High-Throughput of SHA-256 Hash Function with Unfolding Transformation." Global Journal of Engineering and Technology Review Vol.4 (4) October-December. 2019 4, no. 4 (December 30, 2019): 73–81. http://dx.doi.org/10.35609/gjetr.2019.4.4(1).
Full textMichail, Harris E., George S. Athanasiou, George Theodoridis, Andreas Gregoriades, and Costas E. Goutis. "Design and implementation of totally-self checking SHA-1 and SHA-256 hash functions’ architectures." Microprocessors and Microsystems 45 (September 2016): 227–40. http://dx.doi.org/10.1016/j.micpro.2016.05.011.
Full textKim, Mooseop, Deok Gyu Lee, and Jaecheol Ryou. "Compact and unified hardware architecture for SHA-1 and SHA-256 of trusted mobile computing." Personal and Ubiquitous Computing 17, no. 5 (May 11, 2012): 921–32. http://dx.doi.org/10.1007/s00779-012-0543-0.
Full textATHANASIOU, GEORGE S., GEORGE THEODORIDIS, COSTAS E. GOUTIS, HARRIS E. MICHAIL, and TAKIS KASPARIS. "A SYSTEMATIC FLOW FOR DEVELOPING TOTALLY SELF-CHECKING ARCHITECTURES FOR SHA-1 AND SHA-2 CRYPTOGRAPHIC HASH FAMILIES." Journal of Circuits, Systems and Computers 22, no. 06 (July 2013): 1350049. http://dx.doi.org/10.1142/s0218126613500497.
Full textRao, Siddhartha. "Advanced SHA-1 Algorithm Ensuring Stronger Data Integrity." International Journal of Computer Applications 130, no. 8 (November 17, 2015): 25–27. http://dx.doi.org/10.5120/ijca2015907056.
Full textBahramali, Mohsen, Jin Jiang, and Arash Reyhani-Masoleh. "A Fault Detection Scheme for the FPGA Implementation of SHA-1 and SHA-512 Round Computations." Journal of Electronic Testing 27, no. 4 (August 2011): 517–30. http://dx.doi.org/10.1007/s10836-011-5237-4.
Full textNagm, Alhusain, Tetsuyoshi Horiuchi, and Kazuhiro Hongo. "Overcoming Daunting Challenges of Clipping of Paraclinoid Carotid-Ophthalmic and Superior Hypophyseal Artery Aneurysms: 2-Dimensional Operative Video." Operative Neurosurgery 17, no. 6 (March 13, 2019): E252—E253. http://dx.doi.org/10.1093/ons/opz036.
Full textRoy, Maëva, Lucie Lebeau, Céline Chessa, Alexia Damour, Ali Ladram, Bruno Oury, David Boutolleau, Charles Bodet, and Nicolas Lévêque. "Comparison of Anti-Viral Activity of Frog Skin Anti-Microbial Peptides Temporin-Sha and [K3]SHa to LL-37 and Temporin-Tb against Herpes Simplex Virus Type 1." Viruses 11, no. 1 (January 18, 2019): 77. http://dx.doi.org/10.3390/v11010077.
Full textLong, Sihan. "A Comparative Analysis of the Application of Hashing Encryption Algorithms for MD5, SHA-1, and SHA-512." Journal of Physics: Conference Series 1314 (October 2019): 012210. http://dx.doi.org/10.1088/1742-6596/1314/1/012210.
Full textPairin, Yusfrizal Bin. "Kode Autentikasi Hash pada Pesan Teks Berbasis Android." Eksplora Informatika 8, no. 1 (September 28, 2018): 6. http://dx.doi.org/10.30864/eksplora.v8i1.129.
Full textFajri, Khairul, Lili Tanti, and Rofiqoh Dewi. "Aplikasi Verifikasi Ijazah Menggunakan Digital Signature Metode SHA-1." IT (INFORMATIC TECHNIQUE) JOURNAL 5, no. 2 (May 24, 2018): 128. http://dx.doi.org/10.22303/it.5.2.2017.128-138.
Full textJasek, Roman. "SHA-1 and MD5 Cryptographic Hash Functions: Security Overview." Communications - Scientific letters of the University of Zilina 17, no. 1 (February 28, 2015): 73–80. http://dx.doi.org/10.26552/com.c.2015.1.73-80.
Full textKhan, Burhan Ul Islam, Rashidah Funke Olanrewaju, Malik Arman Morshidi, Roohie Naaz Mir, Miss Laiha Binti Mat Kiah, and Abdul Mobeen Khan. "EVOLUTION AND ANALYSIS OF SECURED HASH ALGORITHM (SHA) FAMILY." Malaysian Journal of Computer Science 35, no. 3 (July 27, 2022): 179–200. http://dx.doi.org/10.22452/mjcs.vol35no3.1.
Full textM. Nasution, Rezky. "Implementasi Metode Secure Hash Algorithm (SHA-1) Untuk Mendeteksi Orisinalitas File Audio." Bulletin of Computer Science Research 2, no. 3 (August 31, 2022): 73–84. http://dx.doi.org/10.47065/bulletincsr.v2i3.140.
Full textShen, Quanjun, Liang Fan, Yaohui Yang, Hui Wei, Haifeng Xu, Anzhen Cao, and Yan Zhang. "Study on high temperature performance of coal based modified asphalt mixture." Advances in Engineering Technology Research 1, no. 3 (February 2, 2023): 834. http://dx.doi.org/10.56028/aetr.3.1.834.
Full textVelazhahan, Rethinasamy, Shima Nasser Hamed Al-Mamari, Abdullah Mohammed Al-Sadi, Issa Hashil Al-Mahmooli, and S. P. Sathish Babu. "In vitro antagonistic potential, plant growth-promoting activity and indole-3-acetic acid producing trait of bacterial isolates from spent mushroom substrate of Agaricus bisporus." Journal of Agricultural and Marine Sciences [JAMS] 25, no. 2 (September 20, 2020): 22. http://dx.doi.org/10.24200/jams.vol25iss2pp22-29.
Full textAli Al-Hammadi, Yousef, and Mohamed Fadl Idris Fadl. "Reducing Hash Function Complexity: MD5 and SHA-1 as Examples." International Journal of Mathematical Sciences and Computing 5, no. 1 (January 8, 2019): 1–17. http://dx.doi.org/10.5815/ijmsc.2019.01.01.
Full textLEE, Je-Hoon, Sang-Choon KIM, and Young-Jun SONG. "High-Speed FPGA Implementation of the SHA-1 Hash Function." IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E94-A, no. 9 (2011): 1873–76. http://dx.doi.org/10.1587/transfun.e94.a.1873.
Full textTang, YuChen, Guang Zeng, and WenBao Han. "Classification of disturbance vectors for collision attack in SHA-1." Science China Information Sciences 58, no. 11 (May 4, 2015): 1–10. http://dx.doi.org/10.1007/s11432-015-5280-3.
Full textVisconti, Andrea, and Federico Gorla. "Exploiting an HMAC-SHA-1 Optimization to Speed up PBKDF2." IEEE Transactions on Dependable and Secure Computing 17, no. 4 (July 1, 2020): 775–81. http://dx.doi.org/10.1109/tdsc.2018.2878697.
Full textTimofeev, Eugene V., Eduard G. Malev, and Eduard V. Zemtsovsky. "Small heart anomalies as cardiac manifestations of hereditary connective tissue disorders." Pediatrician (St. Petersburg) 11, no. 5 (December 30, 2020): 5–12. http://dx.doi.org/10.17816/ped1155-12.
Full textKorona, Mateusz, Paweł Szumełda, Mariusz Rawski, and Artur Janicki. "Comparison of Hash Functions for Network Traffic Acquisition Using a Hardware-Accelerated Probe." Electronics 11, no. 11 (May 25, 2022): 1688. http://dx.doi.org/10.3390/electronics11111688.
Full textZhu, Jing Ping, Shi Du, and Xian Li. "Detection of microcystin-producingMicrocystisin Guanqiao Lake using a sandwich hybridization assay." Canadian Journal of Microbiology 58, no. 4 (April 2012): 442–47. http://dx.doi.org/10.1139/w2012-008.
Full textSobti, Rajeev, and Geetha Ganesan. "Performance Evaluation of SHA-3 Final Round Candidate Algorithms on ARM Cortex–M4 Processor." International Journal of Information Security and Privacy 12, no. 1 (January 2018): 63–73. http://dx.doi.org/10.4018/ijisp.2018010106.
Full textHoriuchi, Tetsuyoshi, Tetsuya Goto, Yuichiro Tanaka, Kunihiko Kodama, Keiji Tsutsumi, Kiyoshi Ito, and Kazuhiro Hongo. "Role of superior hypophyseal artery in visual function impairment after paraclinoid carotid artery aneurysm surgery." Journal of Neurosurgery 123, no. 2 (August 2015): 460–66. http://dx.doi.org/10.3171/2014.12.jns141218.
Full textMorosanova, Maria A., Vitaliy A. Kovalev, and Elena I. Morosanova. "Silica Xerogel Doped with Iron(III) as Sensor Material for Salicylhydroxamic Acid Determination in Urine." Gels 7, no. 3 (September 16, 2021): 143. http://dx.doi.org/10.3390/gels7030143.
Full textRomão, Luciane Pimenta Cruz, Adriana Barbosa Araújo, André Henrique Rosa, and Julio Cesar Rocha. "Redução de crômio hexavalente por substâncias húmicas aquáticas imobilizadas em aminopropil sílica." Eclética Química 27, spe (2002): 383–91. http://dx.doi.org/10.1590/s0100-46702002000200031.
Full textNainggolan, Sopiana. "Implementasi Algoritma SHA-256 Pada Aplikasi Duplicate Document Scanner." Resolusi : Rekayasa Teknik Informatika dan Informasi 2, no. 5 (May 25, 2022): 201–13. http://dx.doi.org/10.30865/resolusi.v2i5.368.
Full textSpinsante, Susanna, and Ennio Gambi. "DSA with SHA-1 for Space Telecommand Authentication: Analysis and Results." Journal of Communications Software and Systems 5, no. 1 (March 22, 2009): 26. http://dx.doi.org/10.24138/jcomss.v5i1.212.
Full textKim, Minchul, Younghoon Jung, and Junghwan Song. "A modified exhaustive search on a password system using SHA-1." International Journal of Information Security 16, no. 3 (June 20, 2016): 263–69. http://dx.doi.org/10.1007/s10207-016-0332-2.
Full textQuilala, Rogel Ladia, and Theda Flare Ginoy Quilala. "Document verification using quick response code with modified secure hash algorithm-1 and modified blowfish algorithm." Indonesian Journal of Electrical Engineering and Computer Science 28, no. 1 (October 1, 2022): 470. http://dx.doi.org/10.11591/ijeecs.v28.i1.pp470-479.
Full textKumar, Umesh, and V. Ch Venkaiah. "An Efficient Message Authentication Code Based on Modified MD5-384 Bits Hash Function and Quasigroup." International Journal of Cloud Applications and Computing 12, no. 1 (January 1, 2022): 1–27. http://dx.doi.org/10.4018/ijcac.308275.
Full textAslam, Imran, Irina Perjar, Xiaoyan A. Shi, Jordan B. Renner, Virginia B. Kraus, Yvonne M. Golightly, Joanne M. Jordan, and Amanda E. Nelson. "Associations Between Biomarkers of Joint Metabolism, Hand Osteoarthritis, and Hand Pain and Function: The Johnston County Osteoarthritis Project." Journal of Rheumatology 41, no. 5 (March 1, 2014): 938–44. http://dx.doi.org/10.3899/jrheum.130904.
Full textOyane, Ayako, Ikuko Sakamaki, Yoshiki Shimizu, Kenji Kawaguchi, Yu Sogo, Atsuo Ito, and Naoto Koshizaki. "Laser-Assisted Biomimetic Process for Calcium Phosphate Coating on a Hydroxyapatite Ceramic." Key Engineering Materials 529-530 (November 2012): 217–22. http://dx.doi.org/10.4028/www.scientific.net/kem.529-530.217.
Full textToruan, Dermawan Lumban. "Implementasi Metode Secure Hash Algorithm-1 Untuk Mendeteksi Keaslian File Dokumen." Journal of Information System Research (JOSH) 2, no. 4 (July 24, 2021): 227–34. http://dx.doi.org/10.47065/josh.v2i4.568.
Full textTiwari, Harshvardhan, and Krishna Asawa. "Enhancing the Security Level of SHA-1 by Replacing the MD Paradigm." Journal of Computing and Information Technology 21, no. 4 (2013): 223. http://dx.doi.org/10.2498/cit.1002181.
Full textSilalahi, Lisnayani, and Anita Sindar. "Penerapan Kriptografi Keamanan Data Administrasi Kependudukan Desa Pagar Jati Menggunakan SHA-1." Jurnal Nasional Komputasi dan Teknologi Informasi (JNKTI) 3, no. 2 (October 21, 2020): 182–86. http://dx.doi.org/10.32672/jnkti.v3i2.2413.
Full textManuel, Stéphane. "Classification and generation of disturbance vectors for collision attacks against SHA-1." Designs, Codes and Cryptography 59, no. 1-3 (January 5, 2011): 247–63. http://dx.doi.org/10.1007/s10623-010-9458-9.
Full textTaku, K. J., and Y. D. Amartey. "Suitability study of soybeans husk ash as a mixing material to OPC: Effect of calcination time-preliminary investigation." Kathmandu University Journal of Science, Engineering and Technology 12, no. 1 (November 12, 2018): 13–22. http://dx.doi.org/10.3126/kuset.v12i1.21561.
Full textChitlur, Meera B., Indira Warrier, Madhvi Rajpurkar, Wendy Hollon, Lolita Llanto, and Jeanne M. Lusher. "Thromboelastography in Children with Coagulation Factor Deficiencies." Blood 106, no. 11 (November 16, 2005): 2139. http://dx.doi.org/10.1182/blood.v106.11.2139.2139.
Full textAlim, Muhammad Nurul. "The Analysis of Minimum Distribution to Each Mustahiq and Its Relevance to Zakat al-Fitr Obligation to All Muslims." WARAQAT : Jurnal Ilmu-Ilmu Keislaman 7, no. 2 (December 30, 2022): 220–38. http://dx.doi.org/10.51590/waraqat.v7i2.385.
Full text