Cargando…
An SHA-3 Hardware Architecture against Failures Based on Hamming Codes and Triple Modular Redundancy
Cryptography has become one of the vital disciplines for information technology such as IoT (Internet Of Things), IIoT (Industrial Internet Of Things), I4.0 (Industry 4.0), and automotive applications. Some fundamental characteristics required for these applications are confidentiality, authenticati...
Autores principales: | Torres-Alvarado, Alan, Morales-Rosales, Luis Alberto, Algredo-Badillo, Ignacio, López-Huerta, Francisco, Lobato-Báez, Mariana, López-Pimentel, Juan Carlos |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9031777/ https://www.ncbi.nlm.nih.gov/pubmed/35458970 http://dx.doi.org/10.3390/s22082985 |
Ejemplares similares
-
A SHA-256 Hybrid-Redundancy Hardware Architecture for Detecting and Correcting Errors
por: Algredo-Badillo, Ignacio, et al.
Publicado: (2022) -
Trade-Off Analysis of Hardware Architectures for Channel-Quality Classification Models
por: Torres-Alvarado, Alan, et al.
Publicado: (2022) -
Hybrid Pipeline Hardware Architecture Based on Error Detection and Correction for AES
por: Algredo-Badillo, Ignacio, et al.
Publicado: (2021) -
Compact FPGA hardware architecture for public key encryption in embedded devices
por: Rodríguez-Flores, Luis, et al.
Publicado: (2018) -
A Metaheuristic Optimization Approach for Parameter Estimation in Arrhythmia Classification from Unbalanced Data
por: Carrillo-Alarcón, Juan Carlos, et al.
Publicado: (2020)