Rtl Implementation Of Secure Hash Algorithm 3 (Sha-3) Towards Smaller Area
Secure data transfer has been the most challenging task for Internet of Things (IoT) devices. Data integrity must be ensured before and after the data transmission. Cryptographic hash functions are generally the basis of a secure network and used for data integrity verification. Cryptographic hash f...
Saved in:
主要作者: | |
---|---|
格式: | Thesis |
语言: | English |
出版: |
2017
|
主题: | |
在线阅读: | http://eprints.usm.my/39583/1/LIM_YEN_RUEN_24_Pages.pdf |
标签: |
添加标签
没有标签, 成为第一个标记此记录!
|