Yayın:
A low-area unified hardware architecture for the AES and the cryptographic hash function Grøstl

dc.contributor.authorAt, Nuray
dc.contributor.authorSan, İsmail
dc.contributor.authorEiji Okamoto
dc.contributor.authorİsmail San
dc.contributor.authorTeppei Yamazaki
dc.contributor.orcid0000-0002-7161-4005
dc.contributor.orcid0000-0001-7834-1639
dc.contributor.orcid0000-0003-3005-1813
dc.date.accessioned2025-11-13T10:41:22Z
dc.date.issued2017-02-16
dc.identifier.doihttps://doi.org/10.1016/j.jpdc.2017.01.029
dc.identifier.endpage120
dc.identifier.issn0743-7315
dc.identifier.openalexW2587941876
dc.identifier.startpage106
dc.identifier.urihttps://hdl.handle.net/11421/4954
dc.identifier.urihttps://doi.org/10.1016/j.jpdc.2017.01.029
dc.identifier.volume106
dc.language.isoen
dc.relation.ispartofJournal of Parallel and Distributed Computing
dc.rightsrestrictedAccess
dc.subjectComputer science
dc.subjectEncryption
dc.subjectCryptographic hash function
dc.subjectHash function
dc.subjectEncryption software
dc.subjectCryptography
dc.subjectCoprocessor
dc.subjectAdvanced Encryption Standard
dc.subjectAES implementations
dc.subjectEmbedded system
dc.subjectBlock cipher
dc.subjectKey (lock)
dc.subjectField-programmable gate array
dc.subject40-bit encryption
dc.subjectComputer hardware
dc.subjectAlgorithm
dc.subjectDisk encryption
dc.subjectComputer network
dc.subjectOperating system
dc.subjectComputer security
dc.titleA low-area unified hardware architecture for the AES and the cryptographic hash function Grøstl
dc.typeArticle
dspace.entity.typePublication
local.authorid.openalexA5084052280
local.authorid.openalexA5069831788

Dosyalar

Koleksiyonlar