In-Memory Computation Based Mapping of Keccak-f Hash Function

Cryptographic hash functions play a central role in data security for applications such as message authentication, data verification, and detecting malicious or illegal modification of data. However, such functions typically require intensive computations with high volume of memory accesses. Novel c...

Full description

Bibliographic Details
Main Authors: Kingra, S.K (Author), Parmar, V. (Author), Suri, M. (Author)
Format: Article
Language:English
Published: Frontiers Media S.A. 2022
Subjects:
SHA
Online Access:View Fulltext in Publisher