Rtl Implementation Of Secure Hash Algorithm 3 (Sha-3) Towards Smaller Area
Secure data transfer has been the most challenging task for Internet of Things (IoT) devices. Data integrity must be ensured before and after the data transmission. Cryptographic hash functions are generally the basis of a secure network and used for data integrity verification. Cryptographic hash f...
Main Author: | Lim , Yen Ruen |
---|---|
Format: | Thesis |
Language: | English |
Published: |
2017
|
Subjects: | |
Online Access: | http://eprints.usm.my/39583/1/LIM_YEN_RUEN_24_Pages.pdf |
Similar Items
-
Pipeline implementation of secure hash algorithm (SHA-l) for cryptographic application in network security
by: Hani, Mohamed Khalil, et al.
Published: (2000) -
Hash function of finalist SHA-3: analysis study
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2013) -
Otentikasi dokumen XML menggunakan Algoritma RSA dan HASH SHA-1
by: , SUPRIYANTO, Aji, et al.
Published: (2007) -
Fragile watermarking scheme based on SHA-256 hash function and mersenne twister for medical image authentication
by: Noor Aqilah, Abdul Halim, et al.
Published: (2020) -
Integrating and simulating NVDLA with a RISC-V core in RTL
by: Lim, Nicholas Jan Tuck
Published: (2024)