[1]
|
On Efficiency Enhancement of SHA-3 for FPGA-Based Multimodal Biometric Authentication
|
|
IEEE Transactions on Very Large Scale …,
2022 |
|
|
[2]
|
High Throughput Implementation of the Keccak Hash Function Using the Nios-II Processor
|
|
2020 |
|
|
[3]
|
Scalable and Secure Big Data IoT System Based on Multifactor Authentication and Lightweight Cryptography
|
|
2020 |
|
|
[4]
|
Secure Password-Driven Fingerprint Biometrics Authentication
|
|
2020 |
|
|
[5]
|
Efficient Context-aware File System Approach
|
|
2020 |
|
|
[6]
|
Android CompCache based on Graphics Processing Unit
|
|
2020 |
|
|
[7]
|
Hardware Implementation of SHA Algorithms on Different FPGA and Speed Comparison
|
|
2020 |
|
|
[8]
|
Two Factor Authentication using Twofish Encryption and Visual Cryptography Algorithms for Secure Data Communication
|
|
2019 |
|
|
[9]
|
Апаратна реалізація SHA алгоритмів на різних FPGA та порівняння швидкодії
|
|
2019 |
|
|
[10]
|
ISEkFT: An IBE-Based Searchable Encryption Scheme With k-Keyword Fuzzy Search Trapdoor
|
|
2019 |
|
|
[11]
|
LTCHA: LIGHT-WEIGHT TWO-WAY CRYPTOGRAPHIC HASH ALGORITHM FOR CLOUD
|
|
2018 |
|
|
[12]
|
Photon: A new mix columns architecture on FPGA
|
|
2018 |
|
|
[13]
|
Accelerating Hash Computations Through Efficient Instruction-Set Customisation
|
|
2018 |
|
|
[14]
|
Lightweight Crypto and Security
|
|
Security and Privacy in Cyber‐Physical Systems: Foundations, Principles and Applications,
2018 |
|
|
[15]
|
Efficient FPGA Implementation of the SHA-3 Hash Function
|
|
2017 |
|
|
[16]
|
Fault Attacks Resistant Architecture for KECCAK Hash Function
|
|
International Journal of Advanced Computer Science and Applications,
2017 |
|
|
[17]
|
Efficient countermeasure for reliable KECCAK architecture against fault attacks
|
|
2017 |
|
|
[18]
|
Dynamic Key Exchange Protocol for Security
|
|
2017 |
|
|
[19]
|
Security in Wireless Sensor Networks Using Lightweight Cryptography.
|
|
Journal of Information …,
2017 |
|
|
[20]
|
LIGHT WEIGHT ONE WAY CRYPTOGRPHIC HASH ALGORITHM FOR WIRELESS SENSOR NETWORK
|
|
2016 |
|
|
[21]
|
High throughput pipelined hardware implementation of the KECCAK hash function
|
|
2016 |
|
|
[22]
|
A Light Weight Cryptographic Hash Algorithm for Wireless Sensor Network
|
|
2016 |
|
|
[23]
|
TDHA: A Timestamp Defined Hash Algorithm for Secure Data Dissemination in VANET
|
|
Procedia Computer Science,
2016 |
|
|
[24]
|
SHA-2 and SHA-3 based sequence randomization algorithm
|
|
2016 |
|
|
[25]
|
Multi-Platform Performance Evaluation of the TUAK Mobile Authentication Algorithm
|
|
2016 |
|
|
[26]
|
SHA-3 Blake Finalist on Hardware Architecture of ARM Cortex A8 Processor
|
|
International Journal of Computer Applications,
2015 |
|
|
[27]
|
High Performance Pipelined FPGA Implementation of the SHA-3 Hash Algorithm
|
|
2015 4th Mediterranean Conference on Embedded Computing (MECO),
2015 |
|
|
[28]
|
Efficient FPGA hardware implementation of secure hash function SHA-256/Blake-256
|
|
Systems, Signals & Devices (SSD), 2015 12th International Multi-Conference on,
2015 |
|
|
[29]
|
High Speed FPGA Implementation of Cryptographic KECCAK Hash Function Crypto-Processor
|
|
Journal of Circuits, Systems and Computers,
2015 |
|
|
[30]
|
A Key Distribution Scheme for WSN Based on Hash Chains and Deployment Knowledge
|
|
International Journal of Distributed Sensor Networks,
2015 |
|
|
[31]
|
Large Scale Cloudlets Deployment for Efficient Mobile Cloud Computing
|
|
Journal of Networks,
2015 |
|
|
[32]
|
Pipelined SHA-3 Implementations on FPGA: Architecture and Performance Analysis
|
|
Proceedings of the Second Workshop on Cryptography and Security in Computing Systems,
2015 |
|
|
[33]
|
Water-loaded metal-dielectric wall diagonal horn antenna for hyperthermia application
|
|
2015 |
|
|
[34]
|
GPU Scaling: From Personal Supercomputing to the Cloud
|
|
International Journal of Information Technology and Web Engineering (IJITWE),
2014 |
|
|
[35]
|
FPGA implementation of new standard hash function Keccak
|
|
Consumer Electronics (GCCE), 2014 IEEE 3rd Global Conference on,
2014 |
|
|
[36]
|
A Secured and Time Efficient Electronic Business Framework based on Public Key Cryptography
|
|
International Review on Computers and Software (IRECOS),
2014 |
|
|
[37]
|
High-Throughput Encryption for Cloud Computing Storage System
|
|
International Journal of Cloud Applications and Computing (IJCAC),
2014 |
|
|
[38]
|
High throughput pipelined FPGA implementation of the new SHA-3 cryptographic hash algorithm
|
|
Communications, Control and Signal Processing (ISCCSP), 2014 6th International Symposium on. IEEE,
2014 |
|
|
[39]
|
LOCHA: A Light-weight One-way Cryptographic Hash Algorithm for Wireless Sensor Network
|
|
Procedia Computer Science,
2014 |
|
|
[40]
|
Efficient FPGA Hardware Implementation of Secure Hash Function SHA-2
|
|
International Journal of Computer Network and Information Security (IJCNIS),
2014 |
|
|
[41]
|
28 nanometers FPGAs support for high throughput and low power cryptographic applications.
|
|
2013 |
|
|
[42]
|
Gpu-based personal supercomputing
|
|
Applied Electrical Engineering and Computing Technologies (AEECT), 2013 IEEE Jordan Conference on. IEEE,
2013 |
|
|
[43]
|
28 nanometers FPGAs support for high throughput and low power cryptographic applications
|
|
2013 |
|
|
[44]
|
C3SM: Information Assurance Based on Cryptographic Checksum with Clustering Security Management Protocol
|
|
Journal of Information Security,
2012 |
|
|
[45]
|
A New Efficient Symmetric Encryption Algorithm Design and Implementation.
|
|
Journal of Information Assurance & Security,
2012 |
|
|
[46]
|
Acceleration of Image Processing with SHA-3 (Keccak) Algorithm using FPGA
|
|
|
|
|