High-Throughput of SHA-256 Hash Function with Unfolding Transformation

Hash Function in cryptography algorithms is used to encrypt the message by giving the appropriate output based on the structure of the hash function itself. This algorithm is important for security application such as Keyed-Hash Message Authentication Code (HMAC), digital signature and others. There...

Full description

Saved in:
Bibliographic Details
Main Authors: Shamsiah, Suhaili, Watanabe, Takahiro
Format: Article
Language:English
Published: Global Academy of Training and Research 2019
Subjects:
Online Access:http://ir.unimas.my/id/eprint/33335/1/High-Throughput%20of%20SHA-256%20Hash%20Function%20with%20Unfolding%20Transformation_pdf.pdf
http://ir.unimas.my/id/eprint/33335/
http://www.gjetr.org/vol4.4_1.html
Tags: Add Tag
No Tags, Be the first to tag this record!