Hardware acceleration of secure hash algorithm 3
Secure Hash Algorithm-3 (SHA-3) is the most recent and efficient cryptography hash functions widely used in most information security applications. Contemporary, SHA-3 were built as software where the performance of the cryptographic function is based on the performance of the general-purpose CPU. S...
Saved in:
主要作者: | Ng, Lai Boon |
---|---|
格式: | Thesis |
語言: | English |
出版: |
2020
|
主題: | |
在線閱讀: | http://eprints.utm.my/id/eprint/93016/1/NgLaiBoonMSKE2020.pdf |
標簽: |
添加標簽
沒有標簽, 成為第一個標記此記錄!
|
相似書籍
-
Hash function of cryptographically secure pseudorandom number generator for hardware root-of-trust
由: Ong, Elaine Ei Ling
出版: (2021) -
Hardware accelerator implementation of colour correction algorithm
由: Loh, Shu Ting
出版: (2020) -
Principal component analysis hardware acceleration
由: Ng, Yee Wei
出版: (2020) -
Rtl Implementation Of Secure Hash Algorithm 3 (Sha-3) Towards Smaller Area
由: Lim , Yen Ruen
出版: (2017) -
Secure hash algorithm and secure scheme for key storage in trusted platform module
由: Mohd. Yassin, Mohd. Nazrin
出版: (2009)