High-Throughput of SHA-256 Hash Function with Unfolding Transformation
Hash Function in cryptography algorithms is used to encrypt the message by giving the appropriate output based on the structure of the hash function itself. This algorithm is important for security application such as Keyed-Hash Message Authentication Code (HMAC), digital signature and others. There...
Saved in:
Main Authors: | Shamsiah, Suhaili, Watanabe, Takahiro |
---|---|
Format: | Article |
Language: | English |
Published: |
Global Academy of Training and Research
2019
|
Subjects: | |
Online Access: | http://ir.unimas.my/id/eprint/33335/1/High-Throughput%20of%20SHA-256%20Hash%20Function%20with%20Unfolding%20Transformation_pdf.pdf http://ir.unimas.my/id/eprint/33335/ http://www.gjetr.org/vol4.4_1.html |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
High-Throughput of SHA-256 Hash Function with Unfolding
Transformation
by: Shamsiah, Binti Suhaili, et al.
Published: (2019) -
High-Throughput of SHA-256 Hash Function with Unfolding Transformation
by: Shamsiah, Suhaili, et al.
Published: (2019) -
High-Throughput of SHA-256 Hash Function with Unfolding Transformation
by: Shamsiah, Binti Suhaili, et al.
Published: (2019) -
Design of high-throughput SHA-256 hash function based on FPGA
by: Shamsiah, Binti Suhaili, et al.
Published: (2018) -
FPGA-based Implementation of SHA-256 with Improvement of
Throughput using Unfolding Transformation
by: Shamsiah, Suhaili, et al.
Published: (2022)