Rtl Implementation Of Secure Hash Algorithm 3 (Sha-3) Towards Smaller Area
Secure data transfer has been the most challenging task for Internet of Things (IoT) devices. Data integrity must be ensured before and after the data transmission. Cryptographic hash functions are generally the basis of a secure network and used for data integrity verification. Cryptographic hash f...
Main Author: | Lim , Yen Ruen |
---|---|
Format: | Thesis |
Language: | English |
Published: |
2017
|
Subjects: | |
Online Access: | http://eprints.usm.my/39583/1/LIM_YEN_RUEN_24_Pages.pdf |
Similar Items
-
RTL design of SHA-512 processor core for secure message hashing
by: Chua, Lee Ping
Published: (2008) -
Pipeline implementation of secure hash algorithm (SHA-l) for cryptographic application in network security
by: Hani, Mohamed Khalil, et al.
Published: (2000) -
RTL design of SHA-512 processor core for secure message hashing /
by: Chua, Lee Ping, 1982-, et al.
Published: (2008) -
Hardware acceleration of secure hash algorithm 3
by: Ng, Lai Boon
Published: (2020) -
RTL design of SHA-512 processor core for secure message hashing [electronic resource] /
by: Chua, Lee Ping, 1982-, et al.
Published: (2008)