Sprache: Englisch
Verlag: LAP LAMBERT Academic Publishing, 2012
ISBN 10: 3659247782 ISBN 13: 9783659247781
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
EUR 95,01
Anzahl: 1 verfügbar
In den WarenkorbPaperback. Zustand: Brand New. 68 pages. 8.66x5.91x0.16 inches. In Stock.
Sprache: Englisch
Verlag: LAP Lambert Academic Publishing, 2012
ISBN 10: 3659247782 ISBN 13: 9783659247781
Anbieter: preigu, Osnabrück, Deutschland
Taschenbuch. Zustand: Neu. BLAKE Algorithm Evaluation on ARM Processor | Cortex A9, Cortex M3, ARM7TDMI | Shilpa Chauhan (u. a.) | Taschenbuch | Englisch | LAP Lambert Academic Publishing | EAN 9783659247781 | Verantwortliche Person für die EU: preigu GmbH & Co. KG, Lengericher Landstr. 19, 49078 Osnabrück, mail[at]preigu[dot]de | Anbieter: preigu.
Sprache: Englisch
Verlag: LAP LAMBERT Academic Publishing, 2012
ISBN 10: 3659247782 ISBN 13: 9783659247781
Anbieter: moluna, Greven, Deutschland
EUR 41,67
Anzahl: Mehr als 20 verfügbar
In den WarenkorbKartoniert / Broschiert. Zustand: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Autor/Autorin: Chauhan ShilpaShilpa Chauhan, M Tech: Studied Computer Science and Engineering at Lovely Professional University, Phagwara. Junior Software Engineer at Steria (India) Ltd., Noida.Cryptographic Hash Algorithms are the backbone of .
Sprache: Englisch
Verlag: LAP Lambert Academic Publishing, 2012
ISBN 10: 3659247782 ISBN 13: 9783659247781
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Taschenbuch. Zustand: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - Cryptographic Hash Algorithms are the backbone of modern security systems as they are used in digital signatures, message authentication codes, and many other security applications to generate message digests. A Cryptographic Hash Function maps a message of any length into a fixed-length hash value, (aka message digest) which serves as the authenticator. Most of the Cryptographic hash algorithms have been broken that includes MD5 and SHA-0. SHA-1 has met many theoretical attacks lately that bring a major threat to SHA-2 and all the security applications that are using SHA-2. NIST announced cryptographic hash functions competition in 2007 for the next family of SHA i.e. SHA-3. The winning algorithm will be named 'SHA-3', and will be added to the hash algorithms currently specified in the Federal Information Processing Standard (FIPS) 180-3, Secure Hash Standard. SHA-3 finalist algorithms were open for public comments for one year. My area of work is concentrated on BLAKE algorithm. The analysis given in the book should help the professionals and students to assess the performance of BLAKE on ARM processor platforms: Cortex A9, Cortex M3 and ARM7TDMI.