High Throughput Implementation of the Keccak Hash Function Using the Nios-II Processor

Presently, cryptographic hash functions play a critical role in many applications, such as digital signature systems, security communications, protocols, and network security infrastructures. The new standard cryptographic hash function is Secure Hash Algorithm 3 (SHA-3), which is not vulnerable to...

Full description

Bibliographic Details
Main Authors: Argyrios Sideris, Theodora Sanida, Minas Dasygenis
Format: Article
Language:English
Published: MDPI AG 2020-02-01
Series:Technologies
Subjects:
Online Access:https://www.mdpi.com/2227-7080/8/1/15