Pipeline implementation of secure hash algorithm (SHA-l) for cryptographic application in network security
This paper presents a pipeline implementation of the Secure Hash Algorithm, SUA-I. This design is targeted for the Altera FlexlOKE50 Field Programmable Gate Array (FPGA) on a PCI card. All input output data interface and internal operations are performed in 32-bit width. The major advantage of this...
| Main Authors: | Hani, Mohamed Khalil, Sha'ameri, Ahmad Zuri, Chong, Wei Sheng |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
2000
|
| Subjects: | |
| Online Access: | http://eprints.utm.my/10992/ http://eprints.utm.my/10992/1/MohamedKhalilHani2000_PipelineImplementationofSecureHash.pdf |
Similar Items
Rtl Implementation Of Secure Hash Algorithm 3 (Sha-3) Towards Smaller Area
by: Lim , Yen Ruen
Published: (2017)
by: Lim , Yen Ruen
Published: (2017)
Broad view of cryptographic hash functions
by: Alahmad, Mohammad, et al.
Published: (2013)
by: Alahmad, Mohammad, et al.
Published: (2013)
A new design of cryptographic hash function: gear
by: Alkandari, Abdulaziz M, et al.
Published: (2015)
by: Alkandari, Abdulaziz M, et al.
Published: (2015)
A new design of cryptographic hash function: gear
by: Alkandari, Abdulaziz M, et al.
Published: (2015)
by: Alkandari, Abdulaziz M, et al.
Published: (2015)
Hash function of finalist SHA-3: analysis study
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2013)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2013)
Implementation of pipelined data encryption standard (DES) using altera CPLD
by: Teo, Pock Chueng, et al.
Published: (2000)
by: Teo, Pock Chueng, et al.
Published: (2000)
Cryptographic hash function: a high level view
by: Taha, Imad, et al.
Published: (2015)
by: Taha, Imad, et al.
Published: (2015)
MOIM: a novel design of cryptographic hash function
by: Alahmad, Mohammad, et al.
Published: (2013)
by: Alahmad, Mohammad, et al.
Published: (2013)
Cryptographic hash function: A high level view
by: Alkandari, Abdulaziz Ali, et al.
Published: (2013)
by: Alkandari, Abdulaziz Ali, et al.
Published: (2013)
Personalised cryptographic key generation based on FaceHashing
by: TEOH, A
Published: (2004)
by: TEOH, A
Published: (2004)
FPGA implementation of CPFSK modulation techniques for HF data communication
by: Jaswar, Fitri Dewi, et al.
Published: (2003)
by: Jaswar, Fitri Dewi, et al.
Published: (2003)
Bit-error rate performance analysis of spectrum based detector for FSK digital modulation
by: Sha'ameri, Ahmad Zuri
Published: (2003)
by: Sha'ameri, Ahmad Zuri
Published: (2003)
Time-Frequency Analysis of FSK Digital Modulation Signals using the Smooth Lag-Windowed Wigner-Ville Distribution.
by: Sha'ameri, Ahmad Zuri
Published: (2003)
by: Sha'ameri, Ahmad Zuri
Published: (2003)
Fragile watermarking scheme based on SHA-256 hash function and mersenne twister for medical image authentication
by: Noor Aqilah, Abdul Halim, et al.
Published: (2020)
by: Noor Aqilah, Abdul Halim, et al.
Published: (2020)
SHA family hash function
by: Abdulmajed, Khanssaa Munthir, et al.
Published: (2011)
by: Abdulmajed, Khanssaa Munthir, et al.
Published: (2011)
Privacy in medical emergency system: cryptographic and security aspects
by: Hameed, Shihab A., et al.
Published: (2010)
by: Hameed, Shihab A., et al.
Published: (2010)
FPGA Implementation of RSA Public-Key Cryptographic Coprocessor
by: Hani, Mohamed Khalil, et al.
Published: (2000)
by: Hani, Mohamed Khalil, et al.
Published: (2000)
The lag windowed wigner-ville distribution : an analysis method for HF data communication signals
by: Sha'ameri, Ahmad Zuri, et al.
Published: (1999)
by: Sha'ameri, Ahmad Zuri, et al.
Published: (1999)
Comparison of time-frequency analysis performance on hearts and murmurs
by: Daliman, Shaparas, et al.
Published: (2003)
by: Daliman, Shaparas, et al.
Published: (2003)
Time-Frequency Analysis Of Heart Sounds Using Windowed And Smooth Windowed Wigner-Ville Distribution
by: Daliman, Shaparas, et al.
Published: (2003)
by: Daliman, Shaparas, et al.
Published: (2003)
Window Width Estimation And The Application Of The Windowed Wigner-Ville Distribution In The Analysis Of Heart Sounds And Murmurs
by: Sha'ameri, Ahmad Zuri, et al.
Published: (2000)
by: Sha'ameri, Ahmad Zuri, et al.
Published: (2000)
Performance evaluation of multi carrier modulation techniques for HF frequency selective fading channel
by: Senawi, Ahmad Sazali, et al.
Published: (2002)
by: Senawi, Ahmad Sazali, et al.
Published: (2002)
Detection of binary data for FSK digital modulation signals using spectrum estimation techniques
by: Sha'ameri, Ahmad Zuri, et al.
Published: (2003)
by: Sha'ameri, Ahmad Zuri, et al.
Published: (2003)
Comparison between the performance of spectrogram and multi-window spectrogram in digital modulated communication signals
by: Tan Jo, Lynn, et al.
Published: (2007)
by: Tan Jo, Lynn, et al.
Published: (2007)
Adaptive optimal kernel smooth-windowed wigner-ville distribution for digital communication signal
by: Tan, J. L., et al.
Published: (2008)
by: Tan, J. L., et al.
Published: (2008)
Enhancement of bluetooth security
authentication using hash-based message
authentication code (HMAC) algorithm
by: Diallo, Alhassane Saliou, et al.
Published: (2014)
by: Diallo, Alhassane Saliou, et al.
Published: (2014)
A collision resistant cryptographic hash function based on cellular automata rules
by: Jamil, Norziana
Published: (2013)
by: Jamil, Norziana
Published: (2013)
A Fast Incremental Cryptographic Hash Function
by: Goi , Bok Min
Published: (2003)
by: Goi , Bok Min
Published: (2003)
A Fast Incremental Cryptographic Hash Function
by: Goi, Bok Min
Published: (2003)
by: Goi, Bok Min
Published: (2003)
Secured HF image transmission system
by: Shameri, Ahmad Zuri
Published: (2006)
by: Shameri, Ahmad Zuri
Published: (2006)
Comparison analysis of stream cipher algorithms for digital communication
by: Mat Sidek, Abd. Rahim, et al.
Published: (2007)
by: Mat Sidek, Abd. Rahim, et al.
Published: (2007)
Comparison and analysis study of sha-3 finallists
by: Taha, Imad, et al.
Published: (2012)
by: Taha, Imad, et al.
Published: (2012)
Cryptanalysis in cryptographic algorithm design
by: Z'aba, Muhammad Reza, et al.
Published: (2006)
by: Z'aba, Muhammad Reza, et al.
Published: (2006)
Secure Hashing of Dynamic Hand Signatures Using Wavelet-Fourier Compression with BioPhasor Mixing and 2N Discretization
by: Wai Kuan, Yip, et al.
Published: (2007)
by: Wai Kuan, Yip, et al.
Published: (2007)
Risk identification for an information security management system implementation
by: Ramli, Noraza, et al.
Published: (2012)
by: Ramli, Noraza, et al.
Published: (2012)
Protection of text using SHA1 and Base64
by: Taha, Imad, et al.
Published: (2012)
by: Taha, Imad, et al.
Published: (2012)
Design and implementation of a private and public key crypto processor for next-generation it security applications
by: Hani, Mohamed Khalil, et al.
Published: (2006)
by: Hani, Mohamed Khalil, et al.
Published: (2006)
Implementation and integration of HF messaging system with cryptographic features
by: Mat Sidek, Abd. Rahim
Published: (2006)
by: Mat Sidek, Abd. Rahim
Published: (2006)
Colour Image Steganography Using SHA-512 and Lossless Compression
by: Ng, Ke-Huey, et al.
Published: (2018)
by: Ng, Ke-Huey, et al.
Published: (2018)
A review of cloud security based on cryptographic mechanisms
by: Abd, Sura Khalil, et al.
Published: (2014)
by: Abd, Sura Khalil, et al.
Published: (2014)
Similar Items
-
Rtl Implementation Of Secure Hash Algorithm 3 (Sha-3) Towards Smaller Area
by: Lim , Yen Ruen
Published: (2017) -
Broad view of cryptographic hash functions
by: Alahmad, Mohammad, et al.
Published: (2013) -
A new design of cryptographic hash function: gear
by: Alkandari, Abdulaziz M, et al.
Published: (2015) -
A new design of cryptographic hash function: gear
by: Alkandari, Abdulaziz M, et al.
Published: (2015) -
Hash function of finalist SHA-3: analysis study
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2013)