HW/SW Architecture Exploration for an Efficient Implementation of the Secure Hash Algorithm SHA-256

Hash functions are used in the majority of security protocol to guarantee the integrity and the authenticity. Among the most important hash functions is the SHA-2 family, which offers higher security and solved the insecurity problems of other popular algorithms as MD5, SHA-1 and SHA-0. However, the...

Full description

Bibliographic Details
Main Authors: Manel Kammoun, Manel Elleuchi, Mohamed Abid, Abdulfattah M. Obeid
Format: Article
Language:English
Published: Croatian Communications and Information Society (CCIS) 2021-06-01
Series:Journal of Communications Software and Systems
Subjects:
Online Access:https://jcoms.fesb.unist.hr/10.24138/jcomss-2021-0006/