Enhancing the Hardware Pipelining Optimization Technique of the SHA-3 via FPGA

Information is transmitted between multiple insecure routing hops in text, image, video, and audio. Thus, this multi-hop digital data transfer makes secure transmission with confidentiality and integrity imperative. This protection of the transmitted data can be achieved via hashing algorithms. Furt...

Full description

Bibliographic Details
Main Authors: Argyrios Sideris, Minas Dasygenis
Format: Article
Language:English
Published: MDPI AG 2023-08-01
Series:Computation
Subjects:
Online Access:https://www.mdpi.com/2079-3197/11/8/152