HW/SW Architecture Exploration for an Efficient Implementation of the Secure Hash Algorithm SHA-256
Hash functions are used in the majority of security protocol to guarantee the integrity and the authenticity. Among the most important hash functions is the SHA-2 family, which offers higher security and solved the insecurity problems of other popular algorithms as MD5, SHA-1 and SHA-0. However, the...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Croatian Communications and Information Society (CCIS)
2021-06-01
|
Series: | Journal of Communications Software and Systems |
Subjects: | |
Online Access: | https://jcoms.fesb.unist.hr/10.24138/jcomss-2021-0006/ |