Journal of Information Security

Journal of Information Security

ISSN Print: 2153-1234
ISSN Online: 2153-1242
www.scirp.org/journal/jis
E-mail: jis@scirp.org
"Hardware Performance Evaluation of SHA-3 Candidate Algorithms"
written by Yaser Jararweh, Lo’ai Tawalbeh, Hala Tawalbeh, Abidalrahman Moh’d,
published by Journal of Information Security, Vol.3 No.2, 2012
has been cited by the following article(s):
  • Google Scholar
  • CrossRef
[1] On Efficiency Enhancement of SHA-3 for FPGA-Based Multimodal Biometric Authentication
IEEE Transactions on Very Large Scale …, 2022
[2] High Throughput Implementation of the Keccak Hash Function Using the Nios-II Processor
2020
[3] Scalable and Secure Big Data IoT System Based on Multifactor Authentication and Lightweight Cryptography
2020
[4] Secure Password-Driven Fingerprint Biometrics Authentication
2020
[5] Efficient Context-aware File System Approach
2020
[6] Android CompCache based on Graphics Processing Unit
2020
[7] Hardware Implementation of SHA Algorithms on Different FPGA and Speed Comparison
2020
[8] Two Factor Authentication using Twofish Encryption and Visual Cryptography Algorithms for Secure Data Communication
2019
[9] Апаратна реалізація SHA алгоритмів на різних FPGA та порівняння швидкодії
2019
[10] ISEkFT: An IBE-Based Searchable Encryption Scheme With k-Keyword Fuzzy Search Trapdoor
2019
[11] LTCHA: LIGHT-WEIGHT TWO-WAY CRYPTOGRAPHIC HASH ALGORITHM FOR CLOUD
2018
[12] Photon: A new mix columns architecture on FPGA
2018
[13] Accelerating Hash Computations Through Efficient Instruction-Set Customisation
2018
[14] Lightweight Crypto and Security
Security and Privacy in Cyber‐Physical Systems: Foundations, Principles and Applications, 2018
[15] Efficient FPGA Implementation of the SHA-3 Hash Function
2017
[16] Fault Attacks Resistant Architecture for KECCAK Hash Function
International Journal of Advanced Computer Science and Applications, 2017
[17] Efficient countermeasure for reliable KECCAK architecture against fault attacks
2017
[18] Dynamic Key Exchange Protocol for Security
2017
[19] Security in Wireless Sensor Networks Using Lightweight Cryptography.
Journal of Information …, 2017
[20] LIGHT WEIGHT ONE WAY CRYPTOGRPHIC HASH ALGORITHM FOR WIRELESS SENSOR NETWORK
2016
[21] High throughput pipelined hardware implementation of the KECCAK hash function
2016
[22] A Light Weight Cryptographic Hash Algorithm for Wireless Sensor Network
2016
[23] TDHA: A Timestamp Defined Hash Algorithm for Secure Data Dissemination in VANET
Procedia Computer Science, 2016
[24] SHA-2 and SHA-3 based sequence randomization algorithm
2016
[25] Multi-Platform Performance Evaluation of the TUAK Mobile Authentication Algorithm
2016
[26] SHA-3 Blake Finalist on Hardware Architecture of ARM Cortex A8 Processor
International Journal of Computer Applications, 2015
[27] High Performance Pipelined FPGA Implementation of the SHA-3 Hash Algorithm
2015 4th Mediterranean Conference on Embedded Computing (MECO), 2015
[28] Efficient FPGA hardware implementation of secure hash function SHA-256/Blake-256
Systems, Signals & Devices (SSD), 2015 12th International Multi-Conference on, 2015
[29] High Speed FPGA Implementation of Cryptographic KECCAK Hash Function Crypto-Processor
Journal of Circuits, Systems and Computers, 2015
[30] A Key Distribution Scheme for WSN Based on Hash Chains and Deployment Knowledge
International Journal of Distributed Sensor Networks, 2015
[31] Large Scale Cloudlets Deployment for Efficient Mobile Cloud Computing
Journal of Networks, 2015
[32] Pipelined SHA-3 Implementations on FPGA: Architecture and Performance Analysis
Proceedings of the Second Workshop on Cryptography and Security in Computing Systems, 2015
[33] Water-loaded metal-dielectric wall diagonal horn antenna for hyperthermia application
2015
[34] GPU Scaling: From Personal Supercomputing to the Cloud
International Journal of Information Technology and Web Engineering (IJITWE), 2014
[35] FPGA implementation of new standard hash function Keccak
Consumer Electronics (GCCE), 2014 IEEE 3rd Global Conference on, 2014
[36] A Secured and Time Efficient Electronic Business Framework based on Public Key Cryptography
International Review on Computers and Software (IRECOS), 2014
[37] High-Throughput Encryption for Cloud Computing Storage System
International Journal of Cloud Applications and Computing (IJCAC), 2014
[38] High throughput pipelined FPGA implementation of the new SHA-3 cryptographic hash algorithm
Communications, Control and Signal Processing (ISCCSP), 2014 6th International Symposium on. IEEE, 2014
[39] LOCHA: A Light-weight One-way Cryptographic Hash Algorithm for Wireless Sensor Network
Procedia Computer Science, 2014
[40] Efficient FPGA Hardware Implementation of Secure Hash Function SHA-2
International Journal of Computer Network and Information Security (IJCNIS), 2014
[41] 28 nanometers FPGAs support for high throughput and low power cryptographic applications.
2013
[42] Gpu-based personal supercomputing
Applied Electrical Engineering and Computing Technologies (AEECT), 2013 IEEE Jordan Conference on. IEEE, 2013
[43] 28 nanometers FPGAs support for high throughput and low power cryptographic applications
2013
[44] C3SM: Information Assurance Based on Cryptographic Checksum with Clustering Security Management Protocol
Journal of Information Security, 2012
[45] A New Efficient Symmetric Encryption Algorithm Design and Implementation.
Journal of Information Assurance & Security, 2012
[46] Acceleration of Image Processing with SHA-3 (Keccak) Algorithm using FPGA
Free SCIRP Newsletters
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top