Hash Function in cryptography algorithms is used to encrypt the message by giving the appropriate output based on the structure of the hash function itself. This algorithm is important for security application such as keyed-Hash Message Authentication Code (HMAC), digital signature and others. There are different types of hash function such as MD5, SHA-1, RIPEMD-160, SHA-256, SHA-224, SHA-384, SHA-512 and others. In this paper, the unfolding transformation method was proposed to improve the throughput of the SHA-256 hash function. Three types of SHA-256 hash function were designed namely SHA-256 design, SHA-256 design inner pipelining with unfolding factor 2 and SHA-256 design inner pipelining with unfolding factor 4. The designs were writt...
Abstract:- The main applications of the hash functions are met in the fields of communication integr...
Many cryptographic primitives that are used in cryptographic schemes and security protocols such as ...
Hash functions play an important role in a branch of information secret. The hash algorithm provides...
Hash Function in cryptography algorithms is used to encrypt the message by giving the appropriate ou...
Hash Function in cryptography algorithms is used to encrypt the message by giving the appropriate ou...
Hash Function in cryptography algorithms is used to encrypt the message by giving the appropriate ou...
In recent years, designing of SHA-1 hash function has become popular because it was important in sec...
Security has grown in importance as a study issue in recent years. Several cryptographic algorithms...
Hash functions are utilized in the security layer of every communication protocol and in signature a...
Cryptography is the art of providing security to the message .It gives freedom to the user from hack...
Cryptographic hash function is important for digital signature, Hash Message Authentication Code (HM...
Hash Function is widely used in the protocol scheme. In this paper, the design of SHA-1 hash functio...
The objective of this paper is to design a new secure hash algorithm with final hash code length 512...
Abstract: Many cryptographic applications use RIPEMD-160 hash functions, such as digital signatures,...
Today, security is important on the network. Therefore, the security is provided by the nature of on...
Abstract:- The main applications of the hash functions are met in the fields of communication integr...
Many cryptographic primitives that are used in cryptographic schemes and security protocols such as ...
Hash functions play an important role in a branch of information secret. The hash algorithm provides...
Hash Function in cryptography algorithms is used to encrypt the message by giving the appropriate ou...
Hash Function in cryptography algorithms is used to encrypt the message by giving the appropriate ou...
Hash Function in cryptography algorithms is used to encrypt the message by giving the appropriate ou...
In recent years, designing of SHA-1 hash function has become popular because it was important in sec...
Security has grown in importance as a study issue in recent years. Several cryptographic algorithms...
Hash functions are utilized in the security layer of every communication protocol and in signature a...
Cryptography is the art of providing security to the message .It gives freedom to the user from hack...
Cryptographic hash function is important for digital signature, Hash Message Authentication Code (HM...
Hash Function is widely used in the protocol scheme. In this paper, the design of SHA-1 hash functio...
The objective of this paper is to design a new secure hash algorithm with final hash code length 512...
Abstract: Many cryptographic applications use RIPEMD-160 hash functions, such as digital signatures,...
Today, security is important on the network. Therefore, the security is provided by the nature of on...
Abstract:- The main applications of the hash functions are met in the fields of communication integr...
Many cryptographic primitives that are used in cryptographic schemes and security protocols such as ...
Hash functions play an important role in a branch of information secret. The hash algorithm provides...