Hardware acceleration of secure hash algorithm 3

Secure Hash Algorithm-3 (SHA-3) is the most recent and efficient cryptography hash functions widely used in most information security applications. Contemporary, SHA-3 were built as software where the performance of the cryptographic function is based on the performance of the general-purpose CPU. S...

Full description

Bibliographic Details
Main Author: Ng, Lai Boon
Format: Thesis
Language:English
Published: 2020
Subjects:
Online Access:http://eprints.utm.my/93016/1/NgLaiBoonMSKE2020.pdf