[HTML][HTML] Visually asymmetric image encryption algorithm based on SHA-3 and compressive sensing by embedding encrypted image

X Huang, Y Dong, H Zhu, G Ye - Alexandria Engineering Journal, 2022 - Elsevier
This paper presents a new asymmetric image encryption and hiding algorithm based on
SHA-3 and compressive sensing. First, to resist the chosen-plaintext attack (CPA) and the …

SHA2 and SHA-3 accelerator design in a 7 nm technology within the European Processor Initiative

P Nannipieri, M Bertolucci, L Baldanzi, L Crocetti… - Microprocessors and …, 2021 - Elsevier
This paper proposes the architecture of the hash accelerator, developed in the framework of
the European Processor Initiative. The proposed circuit supports all the SHA2 and SHA-3 …

Parameterized hardware accelerators for lattice-based cryptography and their application to the HW/SW co-design of qTESLA

W Wang, S Tian, B Jungk, N Bindel, P Longa… - IACR transactions on …, 2020 - par.nsf.gov
This paper presents a set of efficient and parameterized hardware accelerators that target
post-quantum lattice-based cryptographic schemes, including a versatile cSHAKE core, a …

[HTML][HTML] Hardware acceleration design of the SHA-3 for high throughput and low area on FPGA

A Sideris, T Sanida, M Dasygenis - Journal of Cryptographic Engineering, 2024 - Springer
In sensitive communications, the cryptographic hash function plays a crucial role, including
in the military, healthcare, and banking, ensuring secure transmission by verifying data …

A complete SHA-3 hardware library based on a high efficiency Keccak design

E Camacho-Ruiz, S Sánchez-Solano… - 2023 IEEE Nordic …, 2023 - ieeexplore.ieee.org
Hash functions are a crucial part of the cryptographic primitives. So much so that in 2007 a
new competition was launched to select new standards for the SHA-3 function, which was …

[PDF][PDF] High-performance FPGA implementation of the secure hash algorithm 3 for single and multi-message processing

F Assad, M Fettach, F El Otmani… - International Journal of …, 2022 - academia.edu
The secure hash function has become the default choice for information security, especially
in applications that require data storing or manipulation. Consequently, optimized …

[HTML][HTML] On hardware acceleration of quantum-resistant FOTA systems in automotive

P Perazzo, S Di Matteo, G Dini, S Saponara - Computers and Electrical …, 2024 - Elsevier
Abstract The Firmware Over-The-Air (FOTA) technology aims at updating the firmware of
mobile computing devices via wireless. In the automotive industry, FOTA can keep the …

[HTML][HTML] Hybridized Hierarchical Watermarking and Selective Encryption for Social Image Security

C Ye, S Tan, Z Wang, B Shi, L Shi - Entropy, 2023 - mdpi.com
With the advent of cloud computing and social multimedia communication, more and more
social images are being collected on social media platforms, such as Facebook, TikTok …

Hardware architectures for post-quantum cryptography

W Wang - 2021 - search.proquest.com
The rapid development of quantum computers poses severe threats to many commonly-
used cryptographic algorithms that are embedded in different hardware devices to ensure …

A multimode SHA-3 accelerator based on RISC-V system

HT Huynh, TP Dang, TK Tran, TT Hoang… - IEICE Electronics …, 2024 - jstage.jst.go.jp
Nowadays, almost all fields cannot lack security, from the essential encryption/decryption to
hash function algorithms. The Secure Hash Algorithm 3 (SHA-3) with four modes, SHA3 …