This paper conducts an extensive comparative study of state-of-the-art solutions for implementing the SHA-3 hash function. SHA-3, a pivotal component in modern …
P Nannipieri, M Bertolucci, L Baldanzi, L Crocetti… - Microprocessors and …, 2021 - Elsevier
This paper proposes the architecture of the hash accelerator, developed in the framework of the European Processor Initiative. The proposed circuit supports all the SHA2 and SHA-3 …
High performance and area efficient Secure Hash Algorithm (SHA-3) hardware realization is investigated and proposed in this work. In addition to the new and simplified round constant …
Securing thousands of connected, resource-constrained computing devices is a major challenge nowadays. Adding to the challenge, third party service providers need regular …
S El Moumni, M Fettach, A Tragha - Microelectronics journal, 2019 - Elsevier
Cryptographic hash function is an essential element in sensitive communications, such as banking, military and health. It ensures secure communication by checking data integrity …
MM Sravani, SA Durai - IEEE Transactions on Very Large Scale …, 2022 - ieeexplore.ieee.org
Synchronized padder block and a compact-dynamic round constant (RC) generator to achieve highly efficient Keccak architecture are proposed in this work. The proposed design …
A Kamadi, Z Abbas - Microelectronics Journal, 2022 - Elsevier
Abstract Random Number Generators (RNGs) are the solution for cryptographic applications to enhance hardware security. These RNGs ought to have three specific properties …
Today, network operators are increasingly playing the role of part-time detectives: they must routinely diagnose intricate problems and malfunctions, eg, routing or performance issues …
F Assad, M Fettach, F El Otmani… - International Journal of …, 2022 - academia.edu
The secure hash function has become the default choice for information security, especially in applications that require data storing or manipulation. Consequently, optimized …