BLAKE Algorithm Evaluation on ARM Processor

BLAKE Algorithm Evaluation on ARM Processor

Cortex A9, Cortex M3, ARM7TDMI

Versandkostenfrei!
Versandfertig in 6-10 Tagen
32,99 €
inkl. MwSt.
PAYBACK Punkte
16 °P sammeln!
Cryptographic Hash Algorithms are the backbone of modern security systems as they are used in digital signatures, message authentication codes, and many other security applications to generate message digests. A Cryptographic Hash Function maps a message of any length into a fixed-length hash value, (aka message digest) which serves as the authenticator. Most of the Cryptographic hash algorithms have been broken that includes MD5 and SHA-0. SHA-1 has met many theoretical attacks lately that bring a major threat to SHA-2 and all the security applications that are using SHA-2. NIST announced cry...