Rtl Implementation Of Secure Hash Algorithm 3 (Sha-3) Towards Smaller Area

Secure data transfer has been the most challenging task for Internet of Things (IoT) devices. Data integrity must be ensured before and after the data transmission. Cryptographic hash functions are generally the basis of a secure network and used for data integrity verification. Cryptographic hash f...

全面介紹

Saved in:
書目詳細資料
主要作者: Lim , Yen Ruen
格式: Thesis
語言:English
出版: 2017
主題:
在線閱讀:http://eprints.usm.my/39583/1/LIM_YEN_RUEN_24_Pages.pdf
標簽: 添加標簽
沒有標簽, 成為第一個標記此記錄!