Zobrazeno 1 - 3
of 3
pro vyhledávání: '"Mohamed Fettach"'
The secure hash function has become the default choice for information security, especially in applications that require data storing or manipulation. Consequently, optimized implementations of these functions in terms of Throughput or Area are in hi
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::626fe157ceff17ad9d945eb333d363bd
https://zenodo.org/record/6767226
https://zenodo.org/record/6767226
Publikováno v:
Microelectronics Journal. 93:104615
Cryptographic hash function is an essential element in sensitive communications, such as banking, military and health. It ensures secure communication by checking data integrity, storing passwords and other important roles. Keccak hash function (i.e.
Publikováno v:
International Journal of Information and Computer Security. 10:361
Cryptographic hash functions have an important role in numerous cryptographic mechanisms like computing digital signatures, checking data integrity, storing passwords and generating random numbers. Due to the cryptanalysis attacks on hash functions,