Cargando…

An SHA-3 Hardware Architecture against Failures Based on Hamming Codes and Triple Modular Redundancy

Cryptography has become one of the vital disciplines for information technology such as IoT (Internet Of Things), IIoT (Industrial Internet Of Things), I4.0 (Industry 4.0), and automotive applications. Some fundamental characteristics required for these applications are confidentiality, authenticati...

Descripción completa

Detalles Bibliográficos
Autores principales: Torres-Alvarado, Alan, Morales-Rosales, Luis Alberto, Algredo-Badillo, Ignacio, López-Huerta, Francisco, Lobato-Báez, Mariana, López-Pimentel, Juan Carlos
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9031777/
https://www.ncbi.nlm.nih.gov/pubmed/35458970
http://dx.doi.org/10.3390/s22082985

Ejemplares similares