Hardware acceleration of secure hash algorithm 3

Secure Hash Algorithm-3 (SHA-3) is the most recent and efficient cryptography hash functions widely used in most information security applications. Contemporary, SHA-3 were built as software where the performance of the cryptographic function is based on the performance of the general-purpose CPU. S...

Full description

Saved in:
Bibliographic Details
Main Author: Ng, Lai Boon
Format: Thesis
Published: 2020
Online Access:http://eprints.utm.my/id/eprint/93016/1/NgLaiBoonMSKE2020.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!