Efficient and Concurrent Reliable Realization of the Secure Cryptographic SHA-3 Algorithm.
Siavash Bayat SarmadiMehran Mozaffari KermaniArash Reyhani-MasolehPublished in: IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. (2014)
Keyphrases
- experimental evaluation
- computational complexity
- computationally efficient
- learning algorithm
- times faster
- k means
- significant improvement
- computational cost
- np hard
- dynamic programming
- particle swarm optimization
- single pass
- clustering method
- pruning strategy
- genetic algorithm
- convergence rate
- optimal solution
- cost function
- objective function
- tree structure
- similarity measure
- highly efficient
- recognition algorithm
- smart card
- matching algorithm
- detection algorithm
- preprocessing
- lightweight
- expectation maximization
- worst case