High-performance multi-function HMAC-SHA2 FPGA implementation
B Kieu-Do-Nguyen, TT Hoang… - 2022 20th IEEE …, 2022 - ieeexplore.ieee.org
Today, Hash-based Message Authentication Code with Secure Hash Algorithm 2 (HMAC-
SHA2) is widely used in modern protocols, such as in Internet Protocol Security (IPSec) and …
SHA2) is widely used in modern protocols, such as in Internet Protocol Security (IPSec) and …
One-way cryptographic hash function securing networks
VA Athavale, S Arora, A Athavale, R Yadav - Proceedings of Academia …, 2022 - Springer
Due to the rapid growth of Internet technologies, voluminous data is generated every minute
from multifarious sources. It is impossible for conventional tools to analyse and process such …
from multifarious sources. It is impossible for conventional tools to analyse and process such …
Design and development of message authentication process for telemedicine application
The delivery of healthcare benefits remotely by utilizing high tech is called telemedicine.
One specific use of telemedicine refers to the electronic communication channel between …
One specific use of telemedicine refers to the electronic communication channel between …
Enhanced key generation algorithm of hashing message authentication code
EG Abad, AM Sison - Proceedings of the 3rd International Conference …, 2019 - dl.acm.org
The keyed-HMAC is a security tool primarily used to ensure authentication and data integrity
in information systems and computer networks. In this study, the authors proposed a new …
in information systems and computer networks. In this study, the authors proposed a new …
[PDF][PDF] Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design.
Some applications, such as Message Authentication Code (MAC), rely on different hashing
operations. There are various hash functions, including Message-Digest 5 (MD5), RACE …
operations. There are various hash functions, including Message-Digest 5 (MD5), RACE …
Novel Cryptographic Hashing Technique for Preserving Integrity in Forensic Samples
Cryptography hash functions are the fundamental building blocks for information security
and have plenty of security applications to protect the data integrity and authentication such …
and have plenty of security applications to protect the data integrity and authentication such …