Hardware acceleration of secure hash algorithm 3
Secure Hash Algorithm-3 (SHA-3) is the most recent and efficient cryptography hash functions widely used in most information security applications. Contemporary, SHA-3 were built as software where the performance of the cryptographic function is based on the performance of the general-purpose CPU. S...
Saved in:
Main Author: | |
---|---|
Format: | Thesis |
Language: | English |
Published: |
2020
|
Subjects: | |
Online Access: | http://eprints.utm.my/id/eprint/93016/1/NgLaiBoonMSKE2020.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|