In-Memory Computation Based Mapping of Keccak-f Hash Function
Cryptographic hash functions play a central role in data security for applications such as message authentication, data verification, and detecting malicious or illegal modification of data. However, such functions typically require intensive computations with high volume of memory accesses. Novel c...
Main Authors: | Kingra, S.K (Author), Parmar, V. (Author), Suri, M. (Author) |
---|---|
Format: | Article |
Language: | English |
Published: |
Frontiers Media S.A.
2022
|
Subjects: | |
Online Access: | View Fulltext in Publisher |
Similar Items
-
In-Memory Computation Based Mapping of Keccak-f Hash Function
by: Kingra, S.K, et al.
Published: (2022) -
High Throughput Implementation of the Keccak Hash Function Using the Nios-II Processor
by: Argyrios Sideris, et al.
Published: (2020-02-01) -
Secure Hash Algorithm-2 formed on DNA
by: Dieaa I. Nassr
Published: (2019-09-01) -
Implementación hardware del algoritmo Keccak para Hash-3 y comparación con Blake, Grøstl, JH y Skein
by: Melissa Ramírez, et al.
Published: (2013-07-01) -
An algorithm for securing user credentials by combining Encryption and Hashing method
by: Awlad Hossain, et al.
Published: (2020-12-01)