HW/SW Architecture Exploration for an Efficient Implementation of the Secure Hash Algorithm SHA-256
Hash functions are used in the majority of security protocol to guarantee the integrity and the authenticity. Among the most important hash functions is the SHA-2 family, which offers higher security and solved the insecurity problems of other popular algorithms as MD5, SHA-1 and SHA-0. However, the...
Main Authors: | Manel Kammoun, Manel Elleuchi, Mohamed Abid, Abdulfattah M. Obeid |
---|---|
Format: | Article |
Language: | English |
Published: |
Croatian Communications and Information Society (CCIS)
2021-06-01
|
Series: | Journal of Communications Software and Systems |
Subjects: | |
Online Access: | https://jcoms.fesb.unist.hr/10.24138/jcomss-2021-0006/ |
Similar Items
-
A High-Performance Multimem SHA-256 Accelerator for Society 5.0
by: Thi Hong Tran, et al.
Published: (2021-01-01) -
A Hybrid-CPU-FPGA-based Solution to the Recovery of Sha256crypt-hashed Passwords
by: Zhendong Zhang, et al.
Published: (2020-08-01) -
High-speed SHA-256 algorithm implementation(高速SHA-256算法硬件实现)
by: CHENHua-feng(陈华锋)
Published: (2009-11-01) -
A New Image Encryption Algorithm Based on Chaos and Secure Hash SHA-256
by: Shuqin Zhu, et al.
Published: (2018-09-01) -
Implementasi Enkripsi Data MD5 dan SHA-256 pada Sistem Informasi Peminjaman Buku Tanah
by: Hajra Rasmita Ngemba, et al.
Published: (2023-08-01)