Area-Efficient FPGA Implementation of Cryptographic SHA3-512

Download Now
Provided by: International Journal of Engineering Trends and Technology
Topic: Hardware
Format: PDF
SHA (Secure Hash Algorithm) is the condensed representation of binary data. A cryptographic hash function is a deterministic process whose input is arbitrary random block of data and produces an output of fixed size, which is known as the hash value. These functions were initially introduced to provide information security, integrity and authentication. In recent years there have been serious and alarming cryptanalytic attacks on several commonly used hash functions, such as MD4, MD5, SHA0, SHA1 and SHA2.
Download Now

Find By Topic