Rtl Implementation Of Secure Hash Algorithm 3 (Sha-3) Towards Smaller Area

Secure data transfer has been the most challenging task for Internet of Things (IoT) devices. Data integrity must be ensured before and after the data transmission. Cryptographic hash functions are generally the basis of a secure network and used for data integrity verification. Cryptographic hash f...

Full description

Saved in:
Bibliographic Details
Main Author: Lim , Yen Ruen
Format: Thesis
Language:English
Published: 2017
Subjects:
Online Access:http://eprints.usm.my/39583/1/LIM_YEN_RUEN_24_Pages.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!