2022
DOI: 10.1007/978-981-16-9952-8_44
|View full text |Cite
|
Sign up to set email alerts
|

Image Hashing Based on SHA-3 Implemented on FPGA

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
1
1

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 6 publications
0
3
0
Order By: Relevance
“…21 Gaj K. et al (2010) [12] Virtex-6 282.7 1272 12.817 10.08 Jararweh Y. et al (2012) [11] Virtex- in the area. Finally, in the works [7,14,18] the researchers show a larger area and smaller frequency than we achieved with our architectures. In our architectures, the primary purpose was not to use an excessive growth of the cost of the area (Slices) so that the throughput (Gbps) and efficiency (Mbps/Slices) are not burdened.…”
Section: Discussionmentioning
confidence: 56%
See 2 more Smart Citations
“…21 Gaj K. et al (2010) [12] Virtex-6 282.7 1272 12.817 10.08 Jararweh Y. et al (2012) [11] Virtex- in the area. Finally, in the works [7,14,18] the researchers show a larger area and smaller frequency than we achieved with our architectures. In our architectures, the primary purpose was not to use an excessive growth of the cost of the area (Slices) so that the throughput (Gbps) and efficiency (Mbps/Slices) are not burdened.…”
Section: Discussionmentioning
confidence: 56%
“…On work [7], the authors focus on 256 × 256 grayscale image encryption. The implementation was done using VHDL.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation