Cryptography aficionados, say hello to a new hash algorithm backed by the National Institute for Standards and Technology (NIST). Dubbed Keccak (pronounced "catch-ack"), the secure hash algorithm, ...
Download this article in PDF format. On the surface, this sounds ridiculous: A lobby fish tank gets attacked by hackers. Why would anyone want to break into a fish tank (Fig. 1)? But in this case, the ...
The National Institute of Standards and Technology (NIST) this week opened a competition to develop a new cryptographic hash algorithm, a tool that converts a file, message or block of data to a short ...
As embedded systems become more powerful and interconnected, security at every stage of system operation becomes critical. In previous articles, we discussed secure SoC architectures and key ...