Full Text Available

Note: Clicking the button above will open the full text document at the original institutional repository in a new window.

High throughput pipelined implementation of SHA3 hash algorithm on FPGA

Saved in:
Bibliographic Details
Published in:Journal of Cryptographic Engineering
Format: Online Article RSS Article
Published: 2025
Subjects:
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1864030188912771073
collection WordPress RSS
FRELIP Feed Integration
container_title Journal of Cryptographic Engineering
description
discipline_display Technology & Engineering
discipline_facet Technology & Engineering
format Online Article
RSS Article
genre Journal Article
id rss_article:13064
institution FRELIP
journal_source_facet Journal of Cryptographic Engineering
publishDate 2025
publishDateSort 2025
record_format rss_article
spellingShingle High throughput pipelined implementation of SHA3 hash algorithm on FPGA
Computer and Cyber Security
Technology & Engineering — Computing
Technology & Engineering
sub_discipline_display Technology & Engineering — Computing
sub_discipline_facet Technology & Engineering — Computing
subject_display Computer and Cyber Security
Technology & Engineering — Computing
Technology & Engineering
Computer and Cyber Security
Technology & Engineering — Computing
Technology & Engineering
subject_facet Computer and Cyber Security
Technology & Engineering — Computing
Technology & Engineering
title High throughput pipelined implementation of SHA3 hash algorithm on FPGA
title_auth High throughput pipelined implementation of SHA3 hash algorithm on FPGA
title_full High throughput pipelined implementation of SHA3 hash algorithm on FPGA
title_fullStr High throughput pipelined implementation of SHA3 hash algorithm on FPGA
title_full_unstemmed High throughput pipelined implementation of SHA3 hash algorithm on FPGA
title_short High throughput pipelined implementation of SHA3 hash algorithm on FPGA
title_sort high throughput pipelined implementation of sha3 hash algorithm on fpga
topic Computer and Cyber Security
Technology & Engineering — Computing
Technology & Engineering
url https://link.springer.com/article/10.1007/s13389-025-00379-3