Simulation-Based Power Estimation for High Throughput SHA-256 Design on Unfolding Transformation
In recent years, security has grown in importance as a research topic. Several cryptographic SHA-256 hash algorithms have been developed to enhance the performance of data-protection techniques. In security system designs where data transmission must be properly encrypted to avoid eavesdropping and...
Saved in:
| Main Authors: | , , , , |
|---|---|
| Format: | Proceeding |
| Language: | en |
| Published: |
2022
|
| Subjects: | |
| Online Access: | http://ir.unimas.my/id/eprint/47969/3/Simulation-Based.pdf http://ir.unimas.my/id/eprint/47969/ https://pubs.aip.org/aip/acp/article-abstract/3056/1/060007/3342683/Simulation-based-power-estimation-for-high?redirectedFrom=fulltext |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
