{"id":"https://openalex.org/W3093995628","doi":"https://doi.org/10.1109/icccnt49239.2020.9225559","title":"An Experimental Evaluation of SHA-512 for Different Modes of Operation","display_name":"An Experimental Evaluation of SHA-512 for Different Modes of Operation","publication_year":2020,"publication_date":"2020-07-01","ids":{"openalex":"https://openalex.org/W3093995628","doi":"https://doi.org/10.1109/icccnt49239.2020.9225559","mag":"3093995628"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccnt49239.2020.9225559","pdf_url":null,"source":{"id":"https://openalex.org/S4363607876","display_name":"2022 13th International Conference on Computing Communication and Networking Technologies (ICCCNT)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5048477116","display_name":"Himanshu N. Bhonge","orcid":null},"institutions":[{"id":"https://openalex.org/I11880225","display_name":"National Institute of Technology Karnataka","ror":"https://ror.org/01hz4v948","country_code":"IN","type":"funder","lineage":["https://openalex.org/I11880225"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Himanshu N. Bhonge","raw_affiliation_strings":["National Institute of Technology Karnataka, Surathkal, Mangalore, India"],"affiliations":[{"raw_affiliation_string":"National Institute of Technology Karnataka, Surathkal, Mangalore, India","institution_ids":["https://openalex.org/I11880225"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056670436","display_name":"Monish K. Ambat","orcid":null},"institutions":[{"id":"https://openalex.org/I11880225","display_name":"National Institute of Technology Karnataka","ror":"https://ror.org/01hz4v948","country_code":"IN","type":"funder","lineage":["https://openalex.org/I11880225"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Monish K. Ambat","raw_affiliation_strings":["National Institute of Technology Karnataka, Surathkal, Mangalore, India"],"affiliations":[{"raw_affiliation_string":"National Institute of Technology Karnataka, Surathkal, Mangalore, India","institution_ids":["https://openalex.org/I11880225"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5009427723","display_name":"B. R. Chandavarkar","orcid":"https://orcid.org/0000-0001-6944-875X"},"institutions":[{"id":"https://openalex.org/I11880225","display_name":"National Institute of Technology Karnataka","ror":"https://ror.org/01hz4v948","country_code":"IN","type":"funder","lineage":["https://openalex.org/I11880225"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"B. R. Chandavarkar","raw_affiliation_strings":["National Institute of Technology Karnataka, Surathkal, Mangalore, India"],"affiliations":[{"raw_affiliation_string":"National Institute of Technology Karnataka, Surathkal, Mangalore, India","institution_ids":["https://openalex.org/I11880225"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.527,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.707884,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":83,"max":84},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9978,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9978,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10583","display_name":"Cancer-related Molecular Pathways","score":0.9814,"subfield":{"id":"https://openalex.org/subfields/2730","display_name":"Oncology"},"field":{"id":"https://openalex.org/fields/27","display_name":"Medicine"},"domain":{"id":"https://openalex.org/domains/4","display_name":"Health Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9751,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/collision-attack","display_name":"Collision attack","score":0.7068416},{"id":"https://openalex.org/keywords/collision-resistance","display_name":"Collision resistance","score":0.5117533},{"id":"https://openalex.org/keywords/mode","display_name":"Mode (computer interface)","score":0.41092274}],"concepts":[{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.87561023},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.71144736},{"id":"https://openalex.org/C87538441","wikidata":"https://www.wikidata.org/wiki/Q389463","display_name":"Collision attack","level":5,"score":0.7068416},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6747489},{"id":"https://openalex.org/C121704057","wikidata":"https://www.wikidata.org/wiki/Q352070","display_name":"Collision","level":2,"score":0.6082796},{"id":"https://openalex.org/C190157925","wikidata":"https://www.wikidata.org/wiki/Q1968605","display_name":"SHA-2","level":4,"score":0.5348721},{"id":"https://openalex.org/C150909736","wikidata":"https://www.wikidata.org/wiki/Q1779448","display_name":"Collision resistance","level":5,"score":0.5117533},{"id":"https://openalex.org/C48677424","wikidata":"https://www.wikidata.org/wiki/Q6888088","display_name":"Mode (computer interface)","level":2,"score":0.41092274},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.392057},{"id":"https://openalex.org/C7608002","wikidata":"https://www.wikidata.org/wiki/Q477202","display_name":"Cryptographic hash function","level":3,"score":0.30554068},{"id":"https://openalex.org/C138111711","wikidata":"https://www.wikidata.org/wiki/Q478351","display_name":"Double hashing","level":4,"score":0.2408604},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.17813006},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.045143813}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccnt49239.2020.9225559","pdf_url":null,"source":{"id":"https://openalex.org/S4363607876","display_name":"2022 13th International Conference on Computing Communication and Networking Technologies (ICCCNT)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":19,"referenced_works":["https://openalex.org/W1566855226","https://openalex.org/W1596861772","https://openalex.org/W2065855469","https://openalex.org/W2150010995","https://openalex.org/W2254151650","https://openalex.org/W2294268844","https://openalex.org/W2407618248","https://openalex.org/W2548631103","https://openalex.org/W2766810672","https://openalex.org/W2780660191","https://openalex.org/W2814638054","https://openalex.org/W2891308959","https://openalex.org/W2892268710","https://openalex.org/W2894806357","https://openalex.org/W2912274893","https://openalex.org/W2933855709","https://openalex.org/W2987451067","https://openalex.org/W4248987559","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W2988738237","https://openalex.org/W2583234487","https://openalex.org/W2356887643","https://openalex.org/W2333106313","https://openalex.org/W2222211799","https://openalex.org/W2189320722","https://openalex.org/W2095867101","https://openalex.org/W1536929968","https://openalex.org/W1487949331","https://openalex.org/W141830613"],"abstract_inverted_index":{"We":[0,57],"have":[1],"different":[2,53],"numbers":[3],"of":[4,8,19,39,55,61,65,72,89],"algorithms":[5],"for":[6,69],"computation":[7,71],"the":[9,37,49,66,70,73],"hash.":[10,74],"SHA-512":[11,50],"is":[12,46],"vulnerable":[13],"to":[14,29,35,47],"pre-image":[15,84],"attacks.":[16,31],"Two":[17],"variants":[18],"SHA-512,":[20],"which":[21],"are":[22,26],"SHA-512/224":[23],"and":[24,41,86],"SHA-512/256,":[25],"also":[27,77],"susceptible":[28],"collision":[30,87],"This":[32,75],"paper":[33,76],"aimed":[34],"overcome":[36],"challenges":[38],"SHA-5112":[40],"its":[42],"variants.":[43],"Our":[44],"approach":[45],"use":[48],"algorithm":[51],"with":[52],"modes":[54],"operation.":[56],"evaluate":[58],"each":[59],"mode":[60],"operation":[62],"in":[63],"terms":[64],"time":[67],"required":[68],"describes":[78],"two":[79],"essential":[80],"properties,":[81],"such":[82],"as":[83],"resistance":[85,88],"our":[90],"approach.":[91]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W3093995628","counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":1}],"updated_date":"2025-04-22T17:39:32.986107","created_date":"2020-10-29"}