An SHA-3 Hardware Architecture against Failures Based on Hamming Codes and Triple Modular Redundancy
Cryptography has become one of the vital disciplines for information technology such as IoT (Internet Of Things), IIoT (Industrial Internet Of Things), I4.0 (Industry 4.0), and automotive applications. Some fundamental characteristics required for these applications are confidentiality, authenticati...
Main Authors: | Algredo-Badillo, I. (Author), Lobato-Báez, M. (Author), López-Huerta, F. (Author), López-Pimentel, J.C (Author), Morales-Rosales, L.A (Author), Torres-Alvarado, A. (Author) |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI
2022
|
Subjects: | |
Online Access: | View Fulltext in Publisher |
Similar Items
-
An SHA-3 Hardware Architecture against Failures Based on Hamming Codes and Triple Modular Redundancy
by: Algredo-Badillo, I., et al.
Published: (2022) -
Self-Healing Router Approach for High-Performance Network-on-Chip
by: Kasem Khalil, et al.
Published: (2021-01-01) -
Proposal of an Adaptive Fault Tolerance Mechanism to Tolerate Intermittent Faults in RAM
by: J.-Carlos Baraza-Calvo, et al.
Published: (2020-12-01) -
Detecting Electromagnetic Injection Attack on FPGAs Using In Situ Timing Sensors
by: Gujar, Surabhi Satyajit
Published: (2020) -
Fault Tolerant Cryptographic Primitives for Space Applications
by: Juliato, Marcio
Published: (2011)