High-performance multi-function HMAC-SHA2 FPGA implementation

B Kieu-Do-Nguyen, TT Hoang… - 2022 20th IEEE …, 2022 - ieeexplore.ieee.org
Today, Hash-based Message Authentication Code with Secure Hash Algorithm 2 (HMAC-
SHA2) is widely used in modern protocols, such as in Internet Protocol Security (IPSec) and …

One-way cryptographic hash function securing networks

VA Athavale, S Arora, A Athavale, R Yadav - Proceedings of Academia …, 2022 - Springer
Due to the rapid growth of Internet technologies, voluminous data is generated every minute
from multifarious sources. It is impossible for conventional tools to analyse and process such …

Design and development of message authentication process for telemedicine application

CK Lim, VJ Iipinge, KL Tan… - 2018 IEEE Conference …, 2018 - ieeexplore.ieee.org
The delivery of healthcare benefits remotely by utilizing high tech is called telemedicine.
One specific use of telemedicine refers to the electronic communication channel between …

Enhanced key generation algorithm of hashing message authentication code

EG Abad, AM Sison - Proceedings of the 3rd International Conference …, 2019 - dl.acm.org
The keyed-HMAC is a security tool primarily used to ensure authentication and data integrity
in information systems and computer networks. In this study, the authors proposed a new …

[PDF][PDF] Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design.

S Suhaili, N Julai, R Sapawi… - Pertanika Journal of …, 2024 - researchgate.net
Some applications, such as Message Authentication Code (MAC), rely on different hashing
operations. There are various hash functions, including Message-Digest 5 (MD5), RACE …

Novel Cryptographic Hashing Technique for Preserving Integrity in Forensic Samples

S Pooja, V Sagar, R Tanwar - Unleashing the Art of Digital …, 2022 - api.taylorfrancis.com
Cryptography hash functions are the fundamental building blocks for information security
and have plenty of security applications to protect the data integrity and authentication such …