Rtl Implementation Of Secure Hash Algorithm 3 (Sha-3) Towards Smaller Area
Secure data transfer has been the most challenging task for Internet of Things (IoT) devices. Data integrity must be ensured before and after the data transmission. Cryptographic hash functions are generally the basis of a secure network and used for data integrity verification. Cryptographic hash f...
Saved in:
Main Author: | Lim , Yen Ruen |
---|---|
Format: | Thesis |
Language: | English |
Published: |
2017
|
Subjects: | |
Online Access: | http://eprints.usm.my/39583/1/LIM_YEN_RUEN_24_Pages.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
RTL design of SHA-512 processor core for secure message hashing
by: Chua, Lee Ping
Published: (2008) -
Hardware acceleration of secure hash algorithm 3
by: Ng, Lai Boon
Published: (2020) -
RTL implementation of one-sided jacobi algorithm for singular value decomposition
by: Wan Mohamad, Wan Ahmad Zainie
Published: (2016) -
Secure hash algorithm and secure scheme for key storage in trusted platform module
by: Mohd. Yassin, Mohd. Nazrin
Published: (2009) -
Implementation Of Low Power Active Security
by: Krishnasamy, Raj Kumar
Published: (2017)