Search

Your search keyword '"SHA-3"' showing total 529 results

Search Constraints

Start Over You searched for: Descriptor "SHA-3" Remove constraint Descriptor: "SHA-3"
529 results on '"SHA-3"'

Search Results

201. Design Exploration of SHA-3 ASIP for IoT on a 32-bit RISC-V Processor

202. Algebraic Fault Analysis of SHA-3 Under Relaxed Fault Models

203. Design and implementation of an ASIP for SHA-3 hash algorithm

204. The Making of K ECCAK.

205. Implementation hardware del algoritmo Keccak para Hash-3 y comparación con Blake, Grøstl, JH y Skein.

206. Look-Up Table Based Implementations of SHA-3 Finalists: JH, Keccak and Skein.

207. Improved zero-sum distinguisher for full round Keccak-f permutation.

208. Hardware Performance Evaluation of SHA-3 Finalists - Blake, Keccak and Skein.

209. VLSI Characterization of the Cryptographic Hash Function BLAKE.

210. Performance Evaluation of SHA-3 Final Round Candidate Algorithms on ARM Cortex–M4 Processor

211. Multi-Core Dataflow Design and Implementation of Secure Hash Algorithm-3

213. Preimage Attacks on the Round-reduced Keccak with Cross-linear Structures

214. A Journey from MD5 to SHA-3

215. Consensus Approaches of High-Value Crypto Currencies and Application in SHA-3

216. Machine-Checked Proofs for Cryptographic Standards: Indifferentiability of Sponge and Secure High-Assurance Implementations of SHA-3

217. Security Improvement in a Modified Merkle-tree

218. Beyond the Limits: SHA-3 in Just 49 Slices

219. LabVIEW-FPGA based implementation of an Authenticated Encryption core

220. SHINE: A Novel SHA-3 Implementation Using ReRAM-based In-Memory Computing

221. A Processing-In-Memory Implementation of SHA-3 Using a Voltage-Gated Spin Hall-Effect Driven MTJ-based Crossbar

222. A low-power SHA-3 designs using embedded digital signal processing slice on FPGA

223. An FPGA-based reconfigurable IPSec AH core with efficient implementation of SHA-3 for high speed IoT applications

224. SHA2 and SHA-3 accelerator design in a 7 nm technology within the European Processor Initiative.

225. Implementation of incognito method and SHA-3 as an alternative to PIN selection in web login

226. Practical collision attacks against round-reduced SHA-3

227. Using the SHA-3 to Derive Encryption Keys Based on Key-File

228. Guards in Action: First-Order SCA Secure Implementations of Ketje Without Additional Randomness

229. Two Step Power Attack on SHA-3 Based MAC

230. A New High Throughput and Area Efficient SHA-3 Implementation

231. Design & Characterization of SHA 3- 256 Bit IP Core

234. SHA-3 Blake Finalist on Hardware Architecture of ARM Cortex A8 Processor

235. Chaining Optimization Methodology: A New SHA-3 Implementation on Low-End Microcontrollers.

236. Using the SHA-3 to derive encryption keys based on key-file

237. Comparison of Hash Function Algorithms Against Attacks: A Review

238. Evolucijske heuristike za pretragu prostora parametara napada umetanjem pogreške

239. Secure Neural Circuits to Mitigate Correlation Power Analysis on SHA-3 Hash Function

240. Brief review on journey of secured hash algorithms

241. High throughput design and implementation of SHA-3 hash algorithm

242. Parallel implementations of SHA-3 on a 24-core processor with software and hardware co-design

243. An efficient HMAC processor based on the SHA-3 HASH function

244. High level synthesis using vivado HLS for optimizations of SHA-3

245. Efficient FPGA Implementation of the SHA-3 Hash Function

246. SHA-3 &locking protocol for distributed database systems

247. Improving FPGA based SHA-3 structures

248. Algebraic fault analysis of SHA-3

249. SHA-3 implementation using ReRAM based in-memory computing architecture

250. Efficient and Concurrent Reliable Realization of the Secure Cryptographic SHA-3 Algorithm

Catalog

Books, media, physical & digital resources