Secure Hash Algorithm SHA-3

被引:0
|
作者
Dirk Fox
机构
关键词
D O I
10.1007/s11623-013-0027-z
中图分类号
学科分类号
摘要
引用
收藏
页码:104 / 104
相关论文
共 50 条
  • [1] Efficient Hardware Implementation of Secure Hash Algorithm (SHA-3) Finalist - Skein
    Latif, Kashif
    Tariq, Muhammad
    Aziz, Arshad
    Mahboob, Athar
    [J]. FRONTIERS IN COMPUTER EDUCATION, 2012, 133 : 933 - 940
  • [2] Efficient FPGA Implementation of Secure Hash Algorithm Grostl - SHA-3 Finalist
    Rao, M. Muzaffar
    Latif, Kashif
    Aziz, Arshad
    Mahboob, Athar
    [J]. EMERGING TRENDS AND APPLICATIONS IN INFORMATION COMMUNICATION TECHNOLOGIES, 2012, 281 : 361 - +
  • [3] Design and implementation of an ASIP for SHA-3 hash algorithm
    Mehrabani, Yavar Safaei
    Ataie, Roghayeh
    Shafiabadi, Mohammad Hossein
    Ghasempour, Abolghasem
    [J]. INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2022, 17 (3-4) : 285 - 309
  • [4] Secure Hash Algorithm-3(SHA-3) implementation on Xilinx FPGAs, Suitable for IoT Applications
    Rao, Muzaffar
    Newe, Thomas
    Grout, Ian
    [J]. INTERNATIONAL JOURNAL ON SMART SENSING AND INTELLIGENT SYSTEMS, 2014, 7 (05): : 1 - 6
  • [5] High Throughput Design and Implementation of SHA-3 Hash Algorithm
    Wu, Xufan
    Li, Shuguo
    [J]. 2017 INTERNATIONAL CONFERENCE ON ELECTRON DEVICES AND SOLID-STATE CIRCUITS (EDSSC), 2017,
  • [6] SHA - THE SECURE HASH ALGORITHM
    STALLINGS, W
    [J]. DR DOBBS JOURNAL, 1994, 19 (04): : 32 - &
  • [7] High Performance Pipelined FPGA Implementation of the SHA-3 Hash Algorithm
    Ioannou, Lenos
    Michail, Harris E.
    Voyiatzis, Artemios G.
    [J]. 2015 4TH MEDITERRANEAN CONFERENCE ON EMBEDDED COMPUTING (MECO), 2015, : 68 - 71
  • [8] Secure Neural Circuits to Mitigate Correlation Power Analysis on SHA-3 Hash Function
    Thesing, James
    Kudithipudi, Dhireesha
    [J]. 2018 31ST INTERNATIONAL CONFERENCE ON VLSI DESIGN AND 2018 17TH INTERNATIONAL CONFERENCE ON EMBEDDED SYSTEMS (VLSID & ES), 2018, : 161 - 166
  • [9] An FPGA implementation of the SHA-3: The BLAKE Hash Function
    Kahri, Fatma
    Bouallegue, Belgacem
    Machhout, Mohsen
    Tourki, Rached
    [J]. 2013 10TH INTERNATIONAL MULTI-CONFERENCE ON SYSTEMS, SIGNALS & DEVICES (SSD), 2013,
  • [10] A secure image encryption algorithm based on chaotic maps and SHA-3
    Ye, Guodong
    Huang, Xiaoling
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (13) : 2015 - 2023