Rtl Implementation Of Secure Hash Algorithm 3 (Sha-3) Towards Smaller Area
Secure data transfer has been the most challenging task for Internet of Things (IoT) devices. Data integrity must be ensured before and after the data transmission. Cryptographic hash functions are generally the basis of a secure network and used for data integrity verification. Cryptographic hash f...
Saved in:
主要作者: | Lim , Yen Ruen |
---|---|
格式: | Thesis |
語言: | English |
出版: |
2017
|
主題: | |
在線閱讀: | http://eprints.usm.my/39583/1/LIM_YEN_RUEN_24_Pages.pdf |
標簽: |
添加標簽
沒有標簽, 成為第一個標記此記錄!
|
相似書籍
-
RTL design of SHA-512 processor core for secure message hashing
由: Chua, Lee Ping
出版: (2008) -
Hardware acceleration of secure hash algorithm 3
由: Ng, Lai Boon
出版: (2020) -
RTL implementation of one-sided jacobi algorithm for singular value decomposition
由: Wan Mohamad, Wan Ahmad Zainie
出版: (2016) -
Secure hash algorithm and secure scheme for key storage in trusted platform module
由: Mohd. Yassin, Mohd. Nazrin
出版: (2009) -
Implementation Of Low Power Active Security
由: Krishnasamy, Raj Kumar
出版: (2017)