SHA-2 acceleration meeting the needs of emerging applications: A comparative survey

R Martino, A Cilardo - IEEE Access, 2020 - ieeexplore.ieee.org
While SHA-2 is a ubiquitous cryptographic hashing primitive, its role in emerging application
domains, eg blockchains or trusted IoT components, has made the acceleration of SHA-2 …

Multipurpose medical image watermarking for effective security solutions

R Sinhal, S Sharma, IA Ansari, V Bajaj - Multimedia Tools and …, 2022 - Springer
Digital medical images contain important information regarding patient's health and very
useful for diagnosis. Even a small change in medical images (especially in the region of …

A high-performance multimem SHA-256 accelerator for society 5.0

TH Tran, HL Pham, Y Nakashima - IEEE Access, 2021 - ieeexplore.ieee.org
The development of a low-cost high-performance secure hash algorithm (SHA)-256
accelerator has recently received extensive interest because SHA-256 is important in …

Blockchain applied to vehicular odometers

LR Abbade, FM Ribeiro, MH da Silva… - IEEE …, 2020 - ieeexplore.ieee.org
Fraud in automobile odometers is a billion dollar problem worldwide. The technical
requirements behind any solution for this problem go through the perennial, secure, and …

FPGA-based implementation of the SHA-256 hash algorithm

M Kammoun, M Elleuchi, M Abid… - … conference on design …, 2020 - ieeexplore.ieee.org
SHA-2 is one of the most popular hash functions since it ensures the integrity and the
authenticity of information. However, this efficiency is verified at the cost of increasing the …

A coarse grained reconfigurable architecture for sha-2 acceleration

HL Pham, TH Tranl, VTD Le… - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
The development of high-speed SHA-2 hardware with high flexibility is urgently needed
because SHA-2 functions are widely employed in numerous fields, from loT devices to cryp …

Automation of cheque transaction using deep learning and optical character recognition

M Jha, M Kabra, S Jobanputra… - … Conference on Smart …, 2019 - ieeexplore.ieee.org
Despite of swift advancements happening in digital technology, financial institutions like
banks still rely upon conventional medium of processing the bank cheques by humans. The …

Towards trust-aware IoT hashing offloading in mobile edge computing

R Islambouli, Z Sweidan, A Mourad… - 2020 International …, 2020 - ieeexplore.ieee.org
The massive increase of IoT connected devices is imposing various challenges at different
dimensions due to the constrained capabilities of devices and huge requirements of …

Performance analysis of md5 and sha-256 algorithms to maintain data integrity

SR Prasanna, BS Premananda - … International Conference on …, 2021 - ieeexplore.ieee.org
Recent advancement and increase in digitization in every dimension of life has led to
increase in data leaks. It is hence very important to protect data from cyber-attacks …

Comparative Study of Sha-256 Optimization Techniques

BS Rawal, LS Kumar, S Maganti… - 2022 IEEE World AI IoT …, 2022 - ieeexplore.ieee.org
A hash function is a useful one-way trap cryptographic algorithm that converts an input of
any size to an output of a fixed length of bits based on the choice of the hash function. In this …