[1]
|
On Efficiency Enhancement of SHA-3 for FPGA-Based Multimodal Biometric Authentication
IEEE Transactions on Very Large Scale Integration (VLSI) Systems,
2022
DOI:10.1109/TVLSI.2022.3148275
|
|
|
[2]
|
On Efficiency Enhancement of SHA-3 for FPGA-Based Multimodal Biometric Authentication
IEEE Transactions on Very Large Scale Integration (VLSI) Systems,
2022
DOI:10.1109/TVLSI.2022.3148275
|
|
|
[3]
|
High Throughput Implementation of the Keccak Hash Function Using the Nios-II Processor
Technologies,
2020
DOI:10.3390/technologies8010015
|
|
|
[4]
|
Scalable and Secure Big Data IoT System Based on Multifactor Authentication and Lightweight Cryptography
IEEE Access,
2020
DOI:10.1109/ACCESS.2020.3002815
|
|
|
[5]
|
Secure Password-Driven Fingerprint Biometrics Authentication
2020 Seventh International Conference on Software Defined Systems (SDS),
2020
DOI:10.1109/SDS49854.2020.9143881
|
|
|
[6]
|
Efficient Context-aware File System Approach
2020 Seventh International Conference on Software Defined Systems (SDS),
2020
DOI:10.1109/SDS49854.2020.9143956
|
|
|
[7]
|
Android CompCache based on Graphics Processing Unit
2020 Seventh International Conference on Software Defined Systems (SDS),
2020
DOI:10.1109/SDS49854.2020.9143880
|
|
|
[8]
|
Hardware Implementation of SHA Algorithms on Different FPGA and Speed Comparison
2020 IEEE Ukrainian Microwave Week (UkrMW),
2020
DOI:10.1109/UkrMW49653.2020.9252678
|
|
|
[9]
|
ISEkFT
Journal of Information Technology Research,
2019
DOI:10.4018/JITR.2019070108
|
|
|
[10]
|
Accelerating Hash Computations Through Efficient Instruction-Set Customisation
2018 31st International Conference on VLSI Design and 2018 17th International Conference on Embedded Systems (VLSID),
2018
DOI:10.1109/VLSID.2018.91
|
|
|
[11]
|
Security and Privacy in Cyber-Physical Systems
2017
DOI:10.1002/9781119226079.ch12
|
|
|
[12]
|
Security and Privacy in Cyber‐Physical Systems
2017
DOI:10.1002/9781119226079.ch12
|
|
|
[13]
|
SHA-2 and SHA-3 based sequence randomization algorithm
2016 2nd International Conference on Science and Technology-Computer (ICST),
2016
DOI:10.1109/ICSTC.2016.7877365
|
|
|
[14]
|
High throughput pipelined hardware implementation of the KECCAK hash function
2016 International Symposium on Signal, Image, Video and Communications (ISIVC),
2016
DOI:10.1109/ISIVC.2016.7894001
|
|
|
[15]
|
Web-Based Services
2016
DOI:10.4018/978-1-4666-9466-8.ch105
|
|
|
[16]
|
High Speed FPGA Implementation of Cryptographic KECCAK Hash Function Crypto-Processor
Journal of Circuits, Systems and Computers,
2016
DOI:10.1142/S0218126616500262
|
|
|
[17]
|
Cloud Technology
2015
DOI:10.4018/978-1-4666-6539-2.ch108
|
|
|
[18]
|
Pipelined SHA-3 Implementations on FPGA
Proceedings of the Second Workshop on Cryptography and Security in Computing Systems - CS2 '15,
2015
DOI:10.1145/2694805.2694808
|
|
|
[19]
|
A Key Distribution Scheme for WSN Based on Hash Chains and Deployment Knowledge
International Journal of Distributed Sensor Networks,
2015
DOI:10.1155/2015/640792
|
|
|
[20]
|
High performance pipelined FPGA implementation of the SHA-3 hash algorithm
2015 4th Mediterranean Conference on Embedded Computing (MECO),
2015
DOI:10.1109/MECO.2015.7181868
|
|
|
[21]
|
Efficient FPGA hardware implementation of secure hash function SHA-256/Blake-256
2015 IEEE 12th International Multi-Conference on Systems, Signals & Devices (SSD15),
2015
DOI:10.1109/SSD.2015.7348105
|
|
|
[22]
|
Pipelined SHA-3 Implementations on FPGA
Proceedings of the Second Workshop on Cryptography and Security in Computing Systems,
2015
DOI:10.1145/2694805.2694808
|
|
|
[23]
|
High-Throughput Encryption for Cloud Computing Storage System
International Journal of Cloud Applications and Computing,
2014
DOI:10.4018/ijcac.2014040101
|
|
|
[24]
|
GPU Scaling
International Journal of Information Technology and Web Engineering,
2014
DOI:10.4018/ijitwe.2014100102
|
|
|
[25]
|
LOCHA: A Light-weight One-way Cryptographic Hash Algorithm for Wireless Sensor Network
Procedia Computer Science,
2014
DOI:10.1016/j.procs.2014.05.453
|
|
|
[26]
|
High throughput pipelined FPGA implementation of the new SHA-3 cryptographic hash algorithm
2014 6th International Symposium on Communications, Control and Signal Processing (ISCCSP),
2014
DOI:10.1109/ISCCSP.2014.6877931
|
|
|
[27]
|
FPGA implementation of new standard hash function Keccak
2014 IEEE 3rd Global Conference on Consumer Electronics (GCCE),
2014
DOI:10.1109/GCCE.2014.7031105
|
|
|
[28]
|
Gpu-based personal supercomputing
2013 IEEE Jordan Conference on Applied Electrical Engineering and Computing Technologies (AEECT),
2013
DOI:10.1109/AEECT.2013.6716444
|
|
|
[29]
|
28 Nanometers FPGAs Support for High Throughput and Low Power Cryptographic Applications
Journal of Advances in Information Technology,
2013
DOI:10.4304/jait.4.2.84-90
|
|
|
[30]
|
C3SM: Information Assurance Based on Cryptographic Checksum with Clustering Security Management Protocol
Journal of Information Security,
2012
DOI:10.4236/jis.2012.34034
|
|
|