Call Us 080-41656200 (Mon-Sat: 10AM-8PM)
Free Shipping above Rs. 1499
Cash On Delivery*

BLAKE Algorithm Evaluation on ARM Processor


Marketed By :  LAP LAMBERT Academic Publishing   Sold By :  Kamal Books International  
Delivery in :  10-12 Business Days


Check Your Delivery Options

Rs. 3,651

Availability: In stock

  • Product Description

Cryptographic Hash Algorithms are the backbone of modern security systems as they are used in digital signatures, message authentication codes, and many other security applications to generate message digests. A Cryptographic Hash Function maps a message of any length into a fixed-length hash value, (aka message digest) which serves as the authenticator. Most of the Cryptographic hash algorithms have been broken that includes MD5 and SHA-0. SHA-1 has met many theoretical attacks lately that bring a major threat to SHA-2 and all the security applications that are using SHA-2. NIST announced cryptographic hash functions competition in 2007 for the next family of SHA i.e. SHA-3. The winning algorithm will be named "SHA-3", and will be added to the hash algorithms currently specified in the Federal Information Processing Standard (FIPS) 180-3, Secure Hash Standard. SHA-3 finalist algorithms were open for public comments for one year. My area of work is concentrated on BLAKE algorithm. The analysis given in the book should help the professionals and students to assess the performance of BLAKE on ARM processor platforms: Cortex A9, Cortex M3 and ARM7TDMI.

Product Specifications
SKU :COC17941
AuthorManoj Wakchaure and Shrinivas Sonkar
Number of Pages104
Publishing Year2012-07-10T00:00:00.000
Edition1 st
Book TypeComputer networking & communications
Country of ManufactureIndia
Product BrandLAP LAMBERT Academic Publishing
Product Packaging InfoBox
In The Box1 Piece
Product First Available On ClickOnCare.com2015-07-27 00:00:00