|
||
www.design-reuse-embedded.com |
Tunable Hash (SHA3) accelerator
|
|
Overview In the beginning of the 2000s, strong progress has been made on hacking NIST standard hash functions, which led to break of the SHA-1 algorithm. This achievement had a lot of consequences on the other NIST standard hash function, SHA-2, since both algorithms share a lot of similarities. In order to be prepared against an effective break of SHA-2, NIST launched a contest to choose a new hash standard, with original approach, different from those used for the previous ones. In 2012, the algorithm Keccak developed by a Western European team was selected as the winner of the NIST contest and became the new hash function standard known as SHA-3.
Please sign in to view full IP description :
|
Partner with us |
List your ProductsSuppliers, list and add your products for free. |
More about D&R Privacy Policy© 2024 Design And Reuse All Rights Reserved. No portion of this site may be copied, retransmitted, reposted, duplicated or otherwise used without the express written permission of Design And Reuse. |
||||||