A VHDL Model for Implementation of MD5 Hash Algorithm
With the increase of the amount of data and users in the information systems, the requirement of data integrity is needed to be improved as well, so the work has become necessary independently. One important element in the information system is a key of authentication schemes, which is used as a mes...
Main Author: | Mohammed A. Noaman |
---|---|
Format: | Article |
Language: | English |
Published: |
Unviversity of Technology- Iraq
2013-06-01
|
Series: | Engineering and Technology Journal |
Subjects: | |
Online Access: | https://etj.uotechnology.edu.iq/article_82078_0a2b27915d14b4cc8d594149647d2570.pdf |
Similar Items
-
Optimizing a Password Hashing Function with Hardware-Accelerated Symmetric Encryption
by: Rafael Álvarez, et al.
Published: (2018-12-01) -
Choosing a password breaking strategy with imposed time restrictions
by: Przemysław Rodwald
Published: (2019-03-01) -
FPGA Design and Implementation of Data Covering Based on MD5 Algorithm
by: Thamir R. Saeed
Published: (2016-12-01) -
High Throughput Implementation of the Keccak Hash Function Using the Nios-II Processor
by: Argyrios Sideris, et al.
Published: (2020-02-01) -
Password–Authenticated Group Key Establishment from Smooth Projective Hash Functions
by: Bohli Jens-Matthias, et al.
Published: (2019-12-01)