Yayın: Compact Keccak Hardware Architecture for Data Integrity and Authentication on FPGAs
| dc.contributor.author | San, İsmail | |
| dc.contributor.author | At, Nuray | |
| dc.contributor.orcid | 0000-0003-3005-1813 | |
| dc.date.accessioned | 2025-11-13T09:42:35Z | |
| dc.date.issued | 2012-01-01 | |
| dc.identifier.doi | https://doi.org/10.1080/19393555.2012.660678 | |
| dc.identifier.endpage | 242 | |
| dc.identifier.issn | 1939-3547 | |
| dc.identifier.issue | 5 | |
| dc.identifier.openalex | W2030252755 | |
| dc.identifier.startpage | 231 | |
| dc.identifier.uri | https://hdl.handle.net/11421/1954 | |
| dc.identifier.uri | https://doi.org/10.1080/19393555.2012.660678 | |
| dc.identifier.volume | 21 | |
| dc.language.iso | en | |
| dc.relation.ispartof | Information Security Journal A Global Perspective | |
| dc.rights | restrictedAccess | |
| dc.subject | Computer science | |
| dc.subject | Field-programmable gate array | |
| dc.subject | Coprocessor | |
| dc.subject | Hash function | |
| dc.subject | Datapath | |
| dc.subject | Embedded system | |
| dc.subject | Cryptography | |
| dc.subject | Cryptographic hash function | |
| dc.subject | Parallel computing | |
| dc.subject | Algorithm | |
| dc.subject.sdg | 9 | |
| dc.title | Compact Keccak Hardware Architecture for Data Integrity and Authentication on FPGAs | |
| dc.type | Article | |
| dspace.entity.type | Publication | |
| local.authorid.openalex | A5069831788 | |
| local.authorid.openalex | A5084052280 |
