Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design

Some applications, such as Message Authentication Code (MAC), rely on different hashing operations. There are various hash functions, including Message-Digest 5 (MD5), RACE Integrity Primitives Evaluation Message Digest 160 (RIPEMD-160), Secure Hash Algorithm 1 (SHA-1), and Secure Hash Algorithm 256...

Full description

Saved in:
Bibliographic Details
Main Authors: Shamsiah, Suhaili, Norhuzaimin, Julai, Rohana, Sapawi, Nordiana, Rajaee
Format: Article
Language:English
Published: UPM Press 2024
Subjects:
Online Access:http://ir.unimas.my/id/eprint/43347/3/Towards.pdf
http://ir.unimas.my/id/eprint/43347/
http://www.pertanika.upm.edu.my/pjst/browse/prepress-issue?article=JST-4050-2022
Tags: Add Tag
No Tags, Be the first to tag this record!