"Hardware Performance Evaluation of SHA-3 Candidate Algorithms"
written by Yaser Jararweh, Lo’ai Tawalbeh, Hala Tawalbeh, Abidalrahman Moh’d,
published by Journal of Information Security, Vol.3 No.2, 2012
has been cited by the following article(s):
  • Google Scholar
  • CrossRef
[1] Android CompCache based on Graphics Processing Unit
2020
[2] Efficient Context-aware File System Approach
2020
[3] Secure Password-Driven Fingerprint Biometrics Authentication
2020
[4] Scalable and Secure Big Data IoT System Based on Multifactor Authentication and Lightweight Cryptography
2020
[5] High Throughput Implementation of the Keccak Hash Function Using the Nios-II Processor
2020
[6] Апаратна реалізація SHA алгоритмів на різних FPGA та порівняння швидкодії
2019
[7] Two Factor Authentication using Twofish Encryption and Visual Cryptography Algorithms for Secure Data Communication
2019
[8] ISEkFT: An IBE-Based Searchable Encryption Scheme With k-Keyword Fuzzy Search Trapdoor
2019
[9] Photon: A new mix columns architecture on FPGA
2018
[10] Lightweight Crypto and Security
Security and Privacy in Cyber‐Physical Systems: Foundations, Principles and Applications, 2018
[11] Accelerating Hash Computations Through Efficient Instruction-Set Customisation
2018
[12] LTCHA: LIGHT-WEIGHT TWO-WAY CRYPTOGRAPHIC HASH ALGORITHM FOR CLOUD
2018
[13] Efficient FPGA Implementation of the SHA-3 Hash Function
2017
[14] Fault Attacks Resistant Architecture for KECCAK Hash Function
International Journal of Advanced Computer Science and Applications, 2017
[15] Efficient countermeasure for reliable KECCAK architecture against fault attacks
2017
[16] Dynamic Key Exchange Protocol for Security
2017
[17] Multi-Platform Performance Evaluation of the TUAK Mobile Authentication Algorithm
2016
[18] SHA-2 and SHA-3 based sequence randomization algorithm
2016
[19] TDHA: A Timestamp Defined Hash Algorithm for Secure Data Dissemination in VANET
Procedia Computer Science, 2016
[20] A Light Weight Cryptographic Hash Algorithm for Wireless Sensor Network
2016
[21] High throughput pipelined hardware implementation of the KECCAK hash function
2016
[22] LIGHT WEIGHT ONE WAY CRYPTOGRPHIC HASH ALGORITHM FOR WIRELESS SENSOR NETWORK
2016
[23] Large Scale Cloudlets Deployment for Efficient Mobile Cloud Computing
Journal of Networks, 2015
[24] A Key Distribution Scheme for WSN Based on Hash Chains and Deployment Knowledge
International Journal of Distributed Sensor Networks, 2015
[25] High Speed FPGA Implementation of Cryptographic KECCAK Hash Function Crypto-Processor
Journal of Circuits, Systems and Computers, 2015
[26] High Performance Pipelined FPGA Implementation of the SHA-3 Hash Algorithm
2015 4th Mediterranean Conference on Embedded Computing (MECO), 2015
[27] SHA-3 Blake Finalist on Hardware Architecture of ARM Cortex A8 Processor
International Journal of Computer Applications, 2015
[28] Pipelined SHA-3 Implementations on FPGA: Architecture and Performance Analysis
Proceedings of the Second Workshop on Cryptography and Security in Computing Systems, 2015
[29] Water-loaded metal-dielectric wall diagonal horn antenna for hyperthermia application
2015
[30] Efficient FPGA hardware implementation of secure hash function SHA-256/Blake-256
Systems, Signals & Devices (SSD), 2015 12th International Multi-Conference on, 2015
[31] Efficient FPGA Hardware Implementation of Secure Hash Function SHA-2
International Journal of Computer Network and Information Security (IJCNIS), 2014
[32] LOCHA: A Light-weight One-way Cryptographic Hash Algorithm for Wireless Sensor Network
Procedia Computer Science, 2014
[33] High throughput pipelined FPGA implementation of the new SHA-3 cryptographic hash algorithm
Communications, Control and Signal Processing (ISCCSP), 2014 6th International Symposium on. IEEE, 2014
[34] A Secured and Time Efficient Electronic Business Framework based on Public Key Cryptography
International Review on Computers and Software (IRECOS), 2014
[35] FPGA implementation of new standard hash function Keccak
Consumer Electronics (GCCE), 2014 IEEE 3rd Global Conference on, 2014
[36] GPU Scaling: From Personal Supercomputing to the Cloud
International Journal of Information Technology and Web Engineering (IJITWE), 2014
[37] High-Throughput Encryption for Cloud Computing Storage System
International Journal of Cloud Applications and Computing (IJCAC), 2014
[38] 28 nanometers FPGAs support for high throughput and low power cryptographic applications.
2013
[39] 28 nanometers FPGAs support for high throughput and low power cryptographic applications
2013
[40] Gpu-based personal supercomputing
Applied Electrical Engineering and Computing Technologies (AEECT), 2013 IEEE Jordan Conference on. IEEE, 2013
[41] A New Efficient Symmetric Encryption Algorithm Design and Implementation.
Journal of Information Assurance & Security, 2012
[42] C3SM: Information Assurance Based on Cryptographic Checksum with Clustering Security Management Protocol
Journal of Information Security, 2012