scholarly journals Almost-Zero Logic Implementation of Troika Hash Function on Reconfigurable Devices

Author(s):  
Talga Yalcin ◽  
Elif Bilge Kavun
2020 ◽  
Vol 3 (2) ◽  
pp. 182-186
Author(s):  
Lisnayani Silalahi ◽  
Anita Sindar

Data security and confidentiality is currently a very important issue and continues to grow. Several cases concerning data security are now a job that requires handling and security costs that are so large. To maintain the security and confidentiality of messages, data, or information so that no one can read or understand it, except for the rightful recipients, a data security system application with an encryption method using an algorithm is designed. The SHA-1 cryptographic hash function that takes input and produces a 160-bit hash value which is known as the message iteration is usually rendered as a 40-digit long hexadecimal number.


2012 ◽  
Vol 35 (9) ◽  
pp. 1868 ◽  
Author(s):  
Wei YU ◽  
Kun-Peng WANG ◽  
Bao LI ◽  
Song TIAN
Keyword(s):  

2013 ◽  
Vol 33 (5) ◽  
pp. 1350-1352
Author(s):  
Peng LIU ◽  
Changhong ZHANG ◽  
Qingyu OU

Author(s):  
Keith M. Martin

This chapter discusses cryptographic mechanisms for providing data integrity. We begin by identifying different levels of data integrity that can be provided. We then look in detail at hash functions, explaining the different security properties that they have, as well as presenting several different applications of a hash function. We then look at hash function design and illustrate this by discussing the hash function SHA-3. Next, we discuss message authentication codes (MACs), presenting a basic model and discussing basic properties. We compare two different MAC constructions, CBC-MAC and HMAC. Finally, we consider different ways of using MACs together with encryption. We focus on authenticated encryption modes, and illustrate these by describing Galois Counter mode.


Author(s):  
Mohamed El-Hadedy ◽  
Martin Margala ◽  
Sergiu Mosanu ◽  
Danilo Gligoroski ◽  
Jinjun Xiong ◽  
...  

2021 ◽  
Vol 12 (1) ◽  
Author(s):  
Francesco Morichetti ◽  
Maziyar Milanizadeh ◽  
Matteo Petrini ◽  
Francesco Zanetto ◽  
Giorgio Ferrari ◽  
...  

AbstractFlexible optical networks require reconfigurable devices with operation on a wavelength range of several tens of nanometers, hitless tuneability (i.e. transparency to other channels during reconfiguration), and polarization independence. All these requirements have not been achieved yet in a single photonic integrated device and this is the reason why the potential of integrated photonics is still largely unexploited in the nodes of optical communication networks. Here we report on a fully-reconfigurable add-drop silicon photonic filter, which can be tuned well beyond the extended C-band (almost 100 nm) in a complete hitless (>35 dB channel isolation) and polarization transparent (1.2 dB polarization dependent loss) way. This achievement is the result of blended strategies applied to the design, calibration, tuning and control of the device. Transmission quality assessment on dual polarization 100 Gbit/s (QPSK) and 200 Gbit/s (16-QAM) signals demonstrates the suitability for dynamic bandwidth allocation in core networks, backhaul networks, intra- and inter-datacenter interconnects.


Author(s):  
Arief Wicaksana ◽  
Olivier Muller ◽  
Frédéric Rousseau ◽  
Arif Sasongko

Sign in / Sign up

Export Citation Format

Share Document