Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Some applications, such as Message Authentication Code (MAC), rely on different hashing operations. There are various hash functions, including Message-Digest 5 (MD5), RACE Integrity Primitives Evaluation Message Digest 160 (RIPEMD-160), Secure Hash Algorithm 1 (SHA-1), and Secure Hash Algorithm 256...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
UPM Press
2024
|
Subjects: | |
Online Access: | http://ir.unimas.my/id/eprint/44211/7/Towards.pdf http://ir.unimas.my/id/eprint/44211/ http://www.pertanika.upm.edu.my/pjst/browse/prepress-issue?article=JST-4050-2022 https://doi.org/10.47836/pjst.32.1.02 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|