2022
DOI: 10.3390/s22082985
|View full text |Cite
|
Sign up to set email alerts
|

An SHA-3 Hardware Architecture against Failures Based on Hamming Codes and Triple Modular Redundancy

Abstract: Cryptography has become one of the vital disciplines for information technology such as IoT (Internet Of Things), IIoT (Industrial Internet Of Things), I4.0 (Industry 4.0), and automotive applications. Some fundamental characteristics required for these applications are confidentiality, authentication, integrity, and nonrepudiation, which can be achieved using hash functions. A cryptographic hash function that provides a higher level of security is SHA-3. However, in real and modern applications, hardware impl… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
8
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(9 citation statements)
references
References 39 publications
0
8
0
Order By: Relevance
“…In addition, Table 1 compares the proposed architecture with three similar reported works [ 13 , 14 , 15 , 16 ].…”
Section: Keccak Implementationmentioning
confidence: 99%
See 3 more Smart Citations
“…In addition, Table 1 compares the proposed architecture with three similar reported works [ 13 , 14 , 15 , 16 ].…”
Section: Keccak Implementationmentioning
confidence: 99%
“…Alvarado et al [ 16 ] proposed a new error detection and correction approach named re-computing for KECCAK. Table 6 compares our architecture with all versions proposed in [ 16 ].…”
Section: Hardware Implementationmentioning
confidence: 99%
See 2 more Smart Citations
“…For instance, scientists Nada E. El-Meligy, Tamer O. Diab and Ashraf S. Mohra described and implemented a number of valuable changes to the standard SHA-512 that they concluded could be employed to enhance the security of the SHA-2 algorithm without losses in performance [1]. In another article that was published recently, Torres-Alvarado et al investigated possible errors in the implementation of the SHA-3 standard and proposed a new architecture that can decrease the probability of failures in the algorithm, which makes it more reliable and also provides better resistance to cryptographic attacks [2]. An important application of the cryptographic hash function that has been actively researched in recent years also includes key generation.…”
Section: Introductionmentioning
confidence: 99%