High-speed hardware architecture based on error detection for Keccak

H Mestiri, I Barraj - Micromachines, 2023 - mdpi.com
The hash function KECCAK integrity algorithm is implemented in cryptographic systems to
provide high security for any circuit requiring integrity and protect the transmitted data. Fault …

Developing a new collision-resistant hashing algorithm

LV Cherckesova, OA Safaryan, NG Lyashenko… - Mathematics, 2022 - mdpi.com
Today, cryptographic hash functions have numerous applications in different areas. At the
same time, new collision attacks have been developed recently, making some widely used …

ПОБУДОВА КОДІВ ХЕММІНГА В СКІНЧЕННИХ ПОЛЯХ ГАЛУА

А ДАВЛЕТОВА - Herald of Khmelnytskyi National University …, 2024 - heraldts.khmnu.edu.ua
В роботі наведено результати досліджень побудови кодів Хеммінга в полях Галуа GF
(p) з метою розширення їх потенціалу та покращення ефективності. Перехід до …

A Survey On Secure Architectures Using Hash Function Based On FPGA for Block Chain Enabled IoT Devices

P Lawhale, SN Kale - … on Emerging Trends in Engineering & …, 2023 - ieeexplore.ieee.org
Currently, a large number of cryptographic techniques have been developed to safeguard
users' original data. In a variety of applications, cryptographic hash functions are employed …