Abstract | ||
---|---|---|
Hash functions are included in almost all cryptographic schemes and security protocols for providing authentication services. JH is a new hash function, introduced in 2008 and it is among the five finalists of the international competition for developing the new hash standard SHA-3. In this study, one non-pipelined and four pipelined architectures are introduced for developing high-performance fie... |
Year | DOI | Venue |
---|---|---|
2013 | 10.1049/iet-cdt.2012.0070 | IET Computers & Digital Techniques |
Keywords | DocType | Volume |
cryptographic protocols,field programmable gate arrays,logic design,parallel architectures,performance evaluation,pipeline processing | Journal | 7 |
Issue | ISSN | Citations |
1 | 1751-8601 | 1 |
PageRank | References | Authors |
0.36 | 12 | 4 |
Name | Order | Citations | PageRank |
---|---|---|---|
george athanasiou | 1 | 13 | 3.10 |
harris e michail | 2 | 156 | 18.29 |
George Theodoridis | 3 | 14 | 3.12 |
Costas E Goutis | 4 | 186 | 25.76 |