Journal of Information Security

Vol.3 No.2(2012), Paper ID 18767, 8 pages

DOI:10.4236/jis.2012.32008

 

Hardware Performance Evaluation of SHA-3 Candidate Algorithms

 

Yaser Jararweh, Lo’ai Tawalbeh, Hala Tawalbeh, Abidalrahman Moh’d

 

Computer Science Department, Jordan University of Science and Technology(CHiS), Irbid, Jordan
Director of Cryptographic Hardware and Information Security Lab (CHiS), Computer Engineering Department,Jordan University of Science and Technology, Irbid, Jordan
Computer Science Department, Jordan University of Science and Technology(CHiS), Irbid, Jordan
Engineering Mathematics & Internetworking, Dalhousie University, Halifax, Canada

 

Copyright © 2012 Yaser Jararweh, Lo’ai Tawalbeh, Hala Tawalbeh, Abidalrahman Moh’d et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

 

How to Cite this Article


Y. Jararweh, L. Tawalbeh, H. Tawalbeh and A. Moh’d, "Hardware Performance Evaluation of SHA-3 Candidate Algorithms," Journal of Information Security, Vol. 3 No. 2, 2012, pp. 69-76. doi: 10.4236/jis.2012.32008.

Copyright © 2026 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.