Digital medical images contain important information regarding patient's health and very useful for diagnosis. Even a small change in medical images (especially in the region of …
The development of a low-cost high-performance secure hash algorithm (SHA)-256 accelerator has recently received extensive interest because SHA-256 is important in …
LR Abbade, FM Ribeiro, MH da Silva… - IEEE …, 2020 - ieeexplore.ieee.org
Fraud in automobile odometers is a billion dollar problem worldwide. The technical requirements behind any solution for this problem go through the perennial, secure, and …
SHA-2 is one of the most popular hash functions since it ensures the integrity and the authenticity of information. However, this efficiency is verified at the cost of increasing the …
The development of high-speed SHA-2 hardware with high flexibility is urgently needed because SHA-2 functions are widely employed in numerous fields, from loT devices to cryp …
M Jha, M Kabra, S Jobanputra… - … Conference on Smart …, 2019 - ieeexplore.ieee.org
Despite of swift advancements happening in digital technology, financial institutions like banks still rely upon conventional medium of processing the bank cheques by humans. The …
R Islambouli, Z Sweidan, A Mourad… - 2020 International …, 2020 - ieeexplore.ieee.org
The massive increase of IoT connected devices is imposing various challenges at different dimensions due to the constrained capabilities of devices and huge requirements of …
Recent advancement and increase in digitization in every dimension of life has led to increase in data leaks. It is hence very important to protect data from cyber-attacks …
BS Rawal, LS Kumar, S Maganti… - 2022 IEEE World AI IoT …, 2022 - ieeexplore.ieee.org
A hash function is a useful one-way trap cryptographic algorithm that converts an input of any size to an output of a fixed length of bits based on the choice of the hash function. In this …