Implementation of TRNG with SHA-3 for hardware security.
Annapurna KamadiZia AbbasPublished in: Microelectron. J. (2022)
Keyphrases
- hardware implementation
- low cost
- graphics cards
- image processing
- hardware and software
- high level language
- random number generator
- information security
- security requirements
- vlsi implementation
- hardware architecture
- network security
- efficient implementation
- intrusion detection
- advanced encryption standard
- general purpose
- dedicated hardware
- high level programming
- software implementation
- security systems
- circuit design
- access control
- signal processing
- database systems