Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Some applications, such as Message Authentication Code (MAC), rely on different hashing operations. There are various hash functions, including Message-Digest 5 (MD5), RACE Integrity Primitives Evaluation Message Digest 160 (RIPEMD-160), Secure Hash Algorithm 1 (SHA-1), and Secure Hash Algorithm 256...
Saved in:
| Main Authors: | , , , |
|---|---|
| Format: | Article |
| Language: | en |
| Published: |
UPM Press
2024
|
| Subjects: | |
| Online Access: | http://ir.unimas.my/id/eprint/43347/3/Towards.pdf http://ir.unimas.my/id/eprint/43347/ http://www.pertanika.upm.edu.my/pjst/browse/prepress-issue?article=JST-4050-2022 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
