Hardware acceleration of secure hash algorithm 3
Secure Hash Algorithm-3 (SHA-3) is the most recent and efficient cryptography hash functions widely used in most information security applications. Contemporary, SHA-3 were built as software where the performance of the cryptographic function is based on the performance of the general-purpose CPU. S...
Saved in:
Main Author: | Ng, Lai Boon |
---|---|
Format: | Thesis |
Language: | English |
Published: |
2020
|
Subjects: | |
Online Access: | http://eprints.utm.my/id/eprint/93016/1/NgLaiBoonMSKE2020.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Hash function of cryptographically secure pseudorandom number generator for hardware root-of-trust
by: Ong, Elaine Ei Ling
Published: (2021) -
Hardware accelerator implementation of colour correction algorithm
by: Loh, Shu Ting
Published: (2020) -
Principal component analysis hardware acceleration
by: Ng, Yee Wei
Published: (2020) -
Rtl Implementation Of Secure Hash Algorithm 3 (Sha-3) Towards Smaller Area
by: Lim , Yen Ruen
Published: (2017) -
Secure hash algorithm and secure scheme for key storage in trusted platform module
by: Mohd. Yassin, Mohd. Nazrin
Published: (2009)