An SHA-3 Hardware Architecture against Failures Based on Hamming Codes and Triple Modular Redundancy

Cryptography has become one of the vital disciplines for information technology such as IoT (Internet Of Things), IIoT (Industrial Internet Of Things), I4.0 (Industry 4.0), and automotive applications. Some fundamental characteristics required for these applications are confidentiality, authenticati...

Full description

Bibliographic Details
Main Authors: Algredo-Badillo, I. (Author), Lobato-Báez, M. (Author), López-Huerta, F. (Author), López-Pimentel, J.C (Author), Morales-Rosales, L.A (Author), Torres-Alvarado, A. (Author)
Format: Article
Language:English
Published: MDPI 2022
Subjects:
Online Access:View Fulltext in Publisher