Efficient Hardware Implementations and Hardware Performance Evaluation of SHA-3 Finalists


Cryptographic hash functions are at the heart of many information security applications like digital signatures, message authentication codes (MACs), and other forms of authentication. In consequence of recent innovations in cryptanalysis of commonly used hash algorithms, NIST USA announced a publicly open competition for selection of new standard Secure… (More)


Figures and Tables

Sorry, we couldn't extract any figures or tables for this paper.