www.design-reuse-china.com
搜索,选择,比较,与提供商进行安全高效的联系
You are here : design-reuse-china.com  > Security  > Cryptography

Tunable Hash (SHA3) accelerator

All Silicon IP

Overview

In the beginning of the 2000s, strong progress has been made on hacking NIST standard hash functions, which led to break of the SHA-1 algorithm. This achievement had a lot of consequences on the other NIST standard hash function, SHA-2, since both algorithms share a lot of similarities. In order to be prepared against an effective break of SHA-2, NIST launched a contest to choose a new hash standard, with original approach, different from those used for the previous ones. In 2012, the algorithm Keccak developed by a Western European team was selected as the winner of the NIST contest and became the new hash function standard known as SHA-3.

业务合作

广告发布

访问我们的广告选项

添加产品

供应商免费录入产品信息

点击此处了解更多关于D&R的隐私政策

© 2023 Design And Reuse

版权所有

本网站的任何部分未经Design&Reuse许可,
不得复制,重发, 转载或以其他方式使用。