Results 131 to 140 of about 32,440 (142)
Some of the next articles are maybe not open access.

Lightweight Implementations of SHA-3 Candidates on FPGAs

2011
The NIST competition for developing the new cryptographic hash algorithm SHA-3 has entered its third round. One evaluation criterion is the ability of the candidate algorithm to be implemented on resource-constrained platforms. This includes FPGAs for embedded and hand-held devices.
Jens-Peter Kaps   +6 more
openaire   +1 more source

Design Pipeline SHA-3 MIPS Processor using FPGA

Journal of Scientific Reports, 2023
The purpose of this study is to implement and evaluate the security of the Keccak hash function in a Microprocessor without Interlocked Pipelines (MIPS) processor using Field Programmable Gate Arrays (FPGA). The design methodology involves selecting a set of instructions that are required to run the SHA-3 Keccak algorithm on the MIPS processor.
openaire   +1 more source

SHA-3-LPHP: Hardware Acceleration of SHA-3 for Low-Power High-Performance Systems

2021 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW), 2021
Yuta Akiya   +6 more
openaire   +1 more source

Performance analysis of SHA 2 and SHA 3

SSRN Electronic Journal, 2022
Swati Sharma, Loveneet ., Saba Khanum
openaire   +1 more source

ASIC implementations of five SHA-3 finalists

2012 Design, Automation & Test in Europe Conference & Exhibition (DATE), 2012
null Xu Guo   +6 more
openaire   +1 more source

Authentication System Based On Ldpc And Sha-3

2022 Sixth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), 2022
Sheetal B V, A Rajagopal
openaire   +1 more source

Side channel analysis of the SHA-3 finalists

2012 Design, Automation & Test in Europe Conference & Exhibition (DATE), 2012
M. Zohner   +3 more
openaire   +1 more source

Home - About - Disclaimer - Privacy