Simulation-Based Power Estimation for High Throughput SHA-256 Design on Unfolding Transformation

In recent years, security has grown in importance as a research topic. Several cryptographic SHA-256 hash algorithms have been developed to enhance the performance of data-protection techniques. In security system designs where data transmission must be properly encrypted to avoid eavesdropping and...

Full description

Saved in:
Bibliographic Details
Main Authors: Shamsiah, Suhaili, Norhuzaimin, Julai, Asrani, Lit, Maimun Binti, Huja Hussin, Mohamad Faizrizwan bin, Mohd Sabri
Format: Proceeding
Language:English
Published: 2022
Subjects:
Online Access:http://ir.unimas.my/id/eprint/41792/3/Simulation-Based.pdf
http://ir.unimas.my/id/eprint/41792/
https://research.utm.my/sie2022/
Tags: Add Tag
No Tags, Be the first to tag this record!