Custom ASIC Design for SHA-256 Using Open-Source Tools
The growth of digital communications has driven the development of numerous cryptographic methods for secure data transfer and storage. The SHA-256 algorithm is a cryptographic hash function widely used for validating data authenticity, identity, and integrity. The inherent SHA-256 computational ove...
| Published in: | Computers |
|---|---|
| Main Authors: | , , , , |
| Format: | Article |
| Language: | English |
| Published: |
MDPI AG
2023-12-01
|
| Subjects: | |
| Online Access: | https://www.mdpi.com/2073-431X/13/1/9 |
