P Nannipieri, M Bertolucci, L Baldanzi, L Crocetti… - Microprocessors and …, 2021 - Elsevier
This paper proposes the architecture of the hash accelerator, developed in the framework of the European Processor Initiative. The proposed circuit supports all the SHA2 and SHA-3 …
This paper presents a set of efficient and parameterized hardware accelerators that target post-quantum lattice-based cryptographic schemes, including a versatile cSHAKE core, a …
In sensitive communications, the cryptographic hash function plays a crucial role, including in the military, healthcare, and banking, ensuring secure transmission by verifying data …
Hash functions are a crucial part of the cryptographic primitives. So much so that in 2007 a new competition was launched to select new standards for the SHA-3 function, which was …
F Assad, M Fettach, F El Otmani… - International Journal of …, 2022 - academia.edu
The secure hash function has become the default choice for information security, especially in applications that require data storing or manipulation. Consequently, optimized …
Abstract The Firmware Over-The-Air (FOTA) technology aims at updating the firmware of mobile computing devices via wireless. In the automotive industry, FOTA can keep the …
C Ye, S Tan, Z Wang, B Shi, L Shi - Entropy, 2023 - mdpi.com
With the advent of cloud computing and social multimedia communication, more and more social images are being collected on social media platforms, such as Facebook, TikTok …
The rapid development of quantum computers poses severe threats to many commonly- used cryptographic algorithms that are embedded in different hardware devices to ensure …
Nowadays, almost all fields cannot lack security, from the essential encryption/decryption to hash function algorithms. The Secure Hash Algorithm 3 (SHA-3) with four modes, SHA3 …