Academic literature on the topic 'SHA-3 Hashing'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'SHA-3 Hashing.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "SHA-3 Hashing"
Sidorenko, A. V., and M. S. Shishko. "Hashing technique based on SHA-3 using chaotic maps1." Informatics 17, no. 1 (2020): 109–18. http://dx.doi.org/10.37661/1816-0301-2020-17-1-109-118.
Full textKhan, Burhan Ul Islam, Rashidah Funke Olanrewaju, Malik Arman Morshidi, Roohie Naaz Mir, Miss Laiha Binti Mat Kiah, and Abdul Mobeen Khan. "EVOLUTION AND ANALYSIS OF SECURED HASH ALGORITHM (SHA) FAMILY." Malaysian Journal of Computer Science 35, no. 3 (2022): 179–200. http://dx.doi.org/10.22452/mjcs.vol35no3.1.
Full textPUTRI, THETA DINNARWATY, WINARNO SUGENG, and GUNAWAN YUGA UTAMA. "Tempat Sampah Pengelola Password Wifi dengan Algoritma TOTP SHA-3." MIND Journal 5, no. 1 (2021): 1–13. http://dx.doi.org/10.26760/mindjournal.v5i1.1-13.
Full textHuynh, Huu-Thuan, Tuan-Kiet Tran, and Tan-Phat Dang. "Implementing a very high-speed secure hash algorithm 3 accelerator based on PCI-express." International Journal of Reconfigurable and Embedded Systems (IJRES) 14, no. 1 (2025): 1. https://doi.org/10.11591/ijres.v14.i1.pp1-11.
Full textHuynh, Huu Thuan, Tuan Kiet Tran, and Tan-Phat Dang. "Implementing a very high-speed secure hash algorithm 3 accelerator based on PCI-express." International Journal of Reconfigurable and Embedded Systems (IJRES) 14, no. 1 (2025): 1–11. https://doi.org/10.11591/ijres.v14.i1.pp1-11.
Full textSinaga, Joice Sharon Gabriella, Nehemia Sitorus, and Steven Lukas Samosir. "Analisis Kinerja Algoritma Hash pada Keamanan Data: Perbandingan Antara SHA-256, SHA-3, dan Blake2." JURNAL QUANCOM: QUANTUM COMPUTER JURNAL 2, no. 2 (2024): 9–16. https://doi.org/10.62375/jqc.v2i2.432.
Full textIkhwan, Syariful, and Risa Farrid Christianti. "Penerapan Keamanan WSN Berbasis Algoritma RSA 2048 dan SHA-3 pada Pemantauan Suhu." Jurnal Nasional Teknologi dan Sistem Informasi 6, no. 3 (2021): 150–57. http://dx.doi.org/10.25077/teknosi.v6i3.2020.150-157.
Full textIkhwan, Syariful, and Risa Farrid Christianti. "Penerapan Keamanan WSN Berbasis Algoritma RSA 2048 dan SHA-3 pada Pemantauan Suhu." Jurnal Nasional Teknologi dan Sistem Informasi 6, no. 3 (2021): 150–57. http://dx.doi.org/10.25077/teknosi.v6i3.2020.150-157.
Full textSideris, Argyrios, and Minas Dasygenis. "Enhancing the Hardware Pipelining Optimization Technique of the SHA-3 via FPGA." Computation 11, no. 8 (2023): 152. http://dx.doi.org/10.3390/computation11080152.
Full textR., SaiGanesh*1 Dr. K. Venkataramana2. "Optimized Digital Signature Algorithm with Multi-Prime RSA." International Journal of Scientific Research and Technology 2, no. 3 (2025): 434–39. https://doi.org/10.5281/zenodo.15078329.
Full textDissertations / Theses on the topic "SHA-3 Hashing"
Rawat, Hemendra Kumar. "Vector Instruction Set Extensions for Efficient and Reliable Computation of Keccak." Thesis, Virginia Tech, 2016. http://hdl.handle.net/10919/72857.
Full textBook chapters on the topic "SHA-3 Hashing"
Albertini, Ange, Jean-Philippe Aumasson, Maria Eichlseder, Florian Mendel, and Martin Schläffer. "Malicious Hashing: Eve’s Variant of SHA-1." In Selected Areas in Cryptography -- SAC 2014. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-13051-4_1.
Full text"Secure Hashing: SHA-1, SHA-2, and SHA-3." In Circuits and Systems for Security and Privacy. CRC Press, 2017. http://dx.doi.org/10.1201/b19499-11.
Full textRoberto Martinez Martinez, Carlos. "Blockchain Mining: Understanding Its Difficulty in Terms of Hashing Algorithm Efficiency." In Blockchain - Pioneering the Web3 Infrastructure for an Intelligent Future [Working Title]. IntechOpen, 2024. http://dx.doi.org/10.5772/intechopen.1005350.
Full textGanesan, P., D. Rosy Salomi Victoria, Arun Singh Chouhan, D. Saravanan, Rekha Baghel, and K. Saikumar. "Enhancing the Protection of Information in Digital Voting Using the Fraud Application of Blockchain Technology." In Advances in Multimedia and Interactive Technologies. IGI Global, 2023. http://dx.doi.org/10.4018/978-1-6684-6060-3.ch011.
Full textConference papers on the topic "SHA-3 Hashing"
Junior, Franklin Magalhaes Ribeiro, Edward D. Moreno, Wanderson Roger Azevedo Dias, and Felipe dos Anjos Lima. "Cache performance analysis of SHA-3 hashing algorithm (BLAKE) and SHA-1." In 2012 XXXVIII Conferencia Latinoamericana En Informatica (CLEI). IEEE, 2012. http://dx.doi.org/10.1109/clei.2012.6427246.
Full textSharma, Jayanti, and Deepali Koppad. "Low power and pipelined secure hashing algorithm-3(SHA-3)." In 2016 IEEE Annual India Conference (INDICON). IEEE, 2016. http://dx.doi.org/10.1109/indicon.2016.7839059.
Full textSklavos, Nicolas. "Multi-module Hashing System for SHA-3 & FPGA Integration." In 2011 International Conference on Field Programmable Logic and Applications (FPL). IEEE, 2011. http://dx.doi.org/10.1109/fpl.2011.37.
Full textAyuzawa, Yusuke, Naoki Fujieda, and Shuichi Ichikawa. "Design trade-offs in SHA-3 multi-message hashing on FPGAs." In TENCON 2014 - 2014 IEEE Region 10 Conference. IEEE, 2014. http://dx.doi.org/10.1109/tencon.2014.7022311.
Full textVanamala, Manuraj, Sarath Chandra Jampani, and Noor Mahammad Sk. "Designing of Secure Hashing Algorithm 3 (SHA-3) in Bluespec System Verilog and Python." In 2024 Second International Conference on Emerging Trends in Information Technology and Engineering (ICETITE). IEEE, 2024. http://dx.doi.org/10.1109/ic-etite58242.2024.10493377.
Full textAkin, Abdulkadir, Aydin Aysu, Onur Can Ulusel, and Erkay Savaş. "Efficient hardware implementations of high throughput SHA-3 candidates keccak, luffa and blue midnight wish for single- and multi-message hashing." In the 3rd international conference. ACM Press, 2010. http://dx.doi.org/10.1145/1854099.1854135.
Full text