Please use this identifier to cite or link to this item:
https://idr.l2.nitk.ac.in/jspui/handle/123456789/15125
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Bhonge H.N. | |
dc.contributor.author | Ambat M.K. | |
dc.contributor.author | Chandavarkar B.R. | |
dc.date.accessioned | 2021-05-05T10:16:30Z | - |
dc.date.available | 2021-05-05T10:16:30Z | - |
dc.date.issued | 2020 | |
dc.identifier.citation | 2020 11th International Conference on Computing, Communication and Networking Technologies, ICCCNT 2020 , Vol. , , p. - | en_US |
dc.identifier.uri | https://doi.org/10.1109/ICCCNT49239.2020.9225559 | |
dc.identifier.uri | http://idr.nitk.ac.in/jspui/handle/123456789/15125 | - |
dc.description.abstract | We have different numbers of algorithms for computation of the hash. SHA-512 is vulnerable to pre-image attacks. Two variants of SHA-512, which are SHA-512/224 and SHA-512/256, are also susceptible to collision attacks. This paper aimed to overcome the challenges of SHA-5112 and its variants. Our approach is to use the SHA-512 algorithm with different modes of operation. We evaluate each mode of operation in terms of the time required for the computation of the hash. This paper also describes two essential properties, such as pre-image resistance and collision resistance of our approach. © 2020 IEEE. | en_US |
dc.title | An Experimental Evaluation of SHA-512 for Different Modes of Operation | en_US |
dc.type | Conference Paper | en_US |
Appears in Collections: | 2. Conference Papers |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.