Rtl Implementation Of Secure Hash Algorithm 3 (Sha-3) Towards Smaller Area
Secure data transfer has been the most challenging task for Internet of Things (IoT) devices. Data integrity must be ensured before and after the data transmission. Cryptographic hash functions are generally the basis of a secure network and used for data integrity verification. Cryptographic hash f...
| Main Author: | Lim , Yen Ruen |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2017
|
| Subjects: | |
| Online Access: | http://eprints.usm.my/39583/ http://eprints.usm.my/39583/1/LIM_YEN_RUEN_24_Pages.pdf |
Similar Items
Pipeline implementation of secure hash algorithm (SHA-l) for cryptographic application in network security
by: Hani, Mohamed Khalil, et al.
Published: (2000)
by: Hani, Mohamed Khalil, et al.
Published: (2000)
Hash function of finalist SHA-3: analysis study
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2013)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2013)
SHA family hash function
by: Abdulmajed, Khanssaa Munthir, et al.
Published: (2011)
by: Abdulmajed, Khanssaa Munthir, et al.
Published: (2011)
Fragile watermarking scheme based on SHA-256 hash function and mersenne twister for medical image authentication
by: Noor Aqilah, Abdul Halim, et al.
Published: (2020)
by: Noor Aqilah, Abdul Halim, et al.
Published: (2020)
Improving collection of data type evidence and the integrity of evidence collected using SHA-256 hashing algorithm for web browsers
by: Asmawi, Aziah, et al.
Published: (2024)
by: Asmawi, Aziah, et al.
Published: (2024)
Design and implementation of MD5 hash function algorithm using verilog HDL
by: Shamsiah, Suhaili, et al.
Published: (2022)
by: Shamsiah, Suhaili, et al.
Published: (2022)
Enhancement of bluetooth security
authentication using hash-based message
authentication code (HMAC) algorithm
by: Diallo, Alhassane Saliou, et al.
Published: (2014)
by: Diallo, Alhassane Saliou, et al.
Published: (2014)
Speech Processing in FPGA with C-to-RTL Compiler Technology
by: Tang, Wei hong, et al.
Published: (2008)
by: Tang, Wei hong, et al.
Published: (2008)
Optimization of an Integrated Circuit Device by Improving ITS VLSI Design from RTL to GDSII
by: Thee, Kang Wei
Published: (2016)
by: Thee, Kang Wei
Published: (2016)
High throughput evaluation of SHA-1 implementation using unfolding transformation
by: Shamsiah, Binti Suhaili, et al.
Published: (2016)
by: Shamsiah, Binti Suhaili, et al.
Published: (2016)
Computational complexity and implementation aspects of the incremental hash function
by: Goi, Bok Min, et al.
Published: (2003)
by: Goi, Bok Min, et al.
Published: (2003)
Implementation Of Low Power Active Security
by: Krishnasamy, Raj Kumar
Published: (2017)
by: Krishnasamy, Raj Kumar
Published: (2017)
Implementation of hashed cryptography algorithm based on cryptography message syntax
by: Ali, Mohammed Ahnaf
Published: (2019)
by: Ali, Mohammed Ahnaf
Published: (2019)
Comparison and analysis study of sha-3 finallists
by: Taha, Imad, et al.
Published: (2012)
by: Taha, Imad, et al.
Published: (2012)
Indexing-First-One Hashing based Cancellable Iris Template Generation
by: Lai, Yen Lung
Published: (2017)
by: Lai, Yen Lung
Published: (2017)
Desirable airfoil features for smaller-capacity straight-bladed VAWT
by: Islam, Mazharul, et al.
Published: (2007)
by: Islam, Mazharul, et al.
Published: (2007)
Smaller radiator with enhanced heat transfer using CNT-nanofluids
by: Ismail, Ahmad Faris, et al.
Published: (2014)
by: Ismail, Ahmad Faris, et al.
Published: (2014)
Image Based Congestion Detection Algorithms And Its Real Time Implementation
by: Khdiar, Ahmed Nidhal
Published: (2015)
by: Khdiar, Ahmed Nidhal
Published: (2015)
Biometric hash: high-confidence face recognition
by: Ngo, D.C.L., et al.
Published: (2006)
by: Ngo, D.C.L., et al.
Published: (2006)
Neuro-Fuzzy Algorithm Implemented In Altera’s FPGA For Mobile Robot’s Obstacle Avoidance Mission.
by: Mahyuddin, Muhammad Nasiruddin, et al.
Published: (2009)
by: Mahyuddin, Muhammad Nasiruddin, et al.
Published: (2009)
FPGA Implementation Of A Multihop Wavelength Division Multiplexing (WDM) Ring Router Algorithm
by: Noordin, Nurul Hazlina
Published: (2004)
by: Noordin, Nurul Hazlina
Published: (2004)
Smaller business performance probability
by: Nursofea Iman, Ahmad Suffian, et al.
Published: (2017)
by: Nursofea Iman, Ahmad Suffian, et al.
Published: (2017)
Dealing with smaller melon plants
by: Teh, Christopher
Published: (2024)
by: Teh, Christopher
Published: (2024)
Data depublication using : Hashing algorithm / Naimah Nayan
by: Nayan, Naimah
Published: (2019)
by: Nayan, Naimah
Published: (2019)
Parallel Geometric Hashing Algorithm For Protein Tertiary Structure.
by: Jaber, Khalid, et al.
Published: (2007)
by: Jaber, Khalid, et al.
Published: (2007)
Investigation of smaller-capacity fixed-pitch SB-VAWT for urban rooftops
by: Islam, Mazharul, et al.
Published: (2010)
by: Islam, Mazharul, et al.
Published: (2010)
Why is the payoff to schooling smaller for immigrants?
by: Chiswick, B., et al.
Published: (2008)
by: Chiswick, B., et al.
Published: (2008)
A new airfoil for the supporting struts of smaller-capacity straight-Bladed VAWT
by: Islam, Mazharul, et al.
Published: (2008)
by: Islam, Mazharul, et al.
Published: (2008)
Performance analysis of a smaller-capacity straight-bladed VAWT with prospective airfoils
by: Islam, Mazharul, et al.
Published: (2008)
by: Islam, Mazharul, et al.
Published: (2008)
Design analysis of a smaller-capacity straight-bladed VAWT with an asymmetric airfoil
by: Islam, Mazharul, et al.
Published: (2011)
by: Islam, Mazharul, et al.
Published: (2011)
Design of a special-purpose airfoil for smaller-capacity straight-bladed VAWT
by: Islam, Mazharul, et al.
Published: (2007)
by: Islam, Mazharul, et al.
Published: (2007)
Protocol of secure key distribution using Hash Functions and Quantum Authenticated channels (KDP-6DP)
by: Majeed, Mohammed Munther A, et al.
Published: (2010)
by: Majeed, Mohammed Munther A, et al.
Published: (2010)
A secure key distribution protocol based on hash functions and a quantum-authenticated channel using 6DP (KDP-6DP)
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2010)
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2010)
Towards Practical Face Recognition System Employing Row-Based Distance Method In 2dpca Based Algorithms
by: Al-Arashi, Waled Hussein Mohammed
Published: (2014)
by: Al-Arashi, Waled Hussein Mohammed
Published: (2014)
Enhanced Particle Swarm Optimization Algorithms With Robust Learning Strategy For Global Optimization
by: Lim, Wei Hong
Published: (2014)
by: Lim, Wei Hong
Published: (2014)
A 0.8 – 2.4 Gbps Driver With Adjustable De-Emphasis Scheme For Ddr3 Memory Interface
by: Lim, Zong Zheng
Published: (2014)
by: Lim, Zong Zheng
Published: (2014)
Fleas and smaller fleas: virotherapy for parasite infections
by: Hyman, Paul, et al.
Published: (2013)
by: Hyman, Paul, et al.
Published: (2013)
Relationship between drivers of performance in smaller firms.
by: Zulkifli, Norzima, et al.
Published: (2011)
by: Zulkifli, Norzima, et al.
Published: (2011)
Protection of the digital Holy Quran hash digest by using cryptography algorithms
by: Alahmad, Mohammad, et al.
Published: (2013)
by: Alahmad, Mohammad, et al.
Published: (2013)
Prevention And Detection Mechanism For Security In Passive Rfid System
by: Khor, Jing Huey
Published: (2013)
by: Khor, Jing Huey
Published: (2013)
Similar Items
-
Pipeline implementation of secure hash algorithm (SHA-l) for cryptographic application in network security
by: Hani, Mohamed Khalil, et al.
Published: (2000) -
Hash function of finalist SHA-3: analysis study
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2013) -
SHA family hash function
by: Abdulmajed, Khanssaa Munthir, et al.
Published: (2011) -
Fragile watermarking scheme based on SHA-256 hash function and mersenne twister for medical image authentication
by: Noor Aqilah, Abdul Halim, et al.
Published: (2020) -
Improving collection of data type evidence and the integrity of evidence collected using SHA-256 hashing algorithm for web browsers
by: Asmawi, Aziah, et al.
Published: (2024)