Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

secure hash algorithm (SHA)-3

biblio

Visible to the public Efficient and Concurrent Reliable Realization of the Secure Cryptographic SHA-3 Algorithm

Submitted by BrandonB on Wed, 05/06/2015 - 11:49am
  • injection-based fault simulations
  • Transient analysis
  • step-forward toward
  • SHA-3 algorithm
  • security
  • secure hash algorithm (SHA)-3
  • secure hash algorithm
  • rotated operand-based scheme
  • robust hardware implementations
  • Reliability
  • pseudorandom number generation
  • performance overheads
  • parallel processing
  • low-complexity recomputing
  • Keccak
  • integrity checking
  • acceptable complexity
  • high-performance concurrent error detection scheme
  • high performance
  • hashing
  • hardware overhead reduction
  • Hardware
  • error detection
  • error coverage
  • Cryptography
  • concurrency control
  • computational complexity
  • Circuit faults
  • ASIC analysis
  • Application-specific integrated circuit (ASIC)
  • application specific integrated circuits
  • Algorithm design and analysis

Terms of Use  |  ©2023. CPS-VO