An e-Voting Model to Preserve Vote Integrity Employing SHA3 Algorithm
Author:
Patel B.,Bhatti D.
Publisher
Springer Singapore
Reference22 articles.
1. Yang, Y., He, D., Kumar, N., Zeadally, S.: Compact hardware implementation of a SHA-3 core for wireless body sensor networks. IEEE Access 6, 40128–40136 (2018). https://doi.org/10.1109/ACCESS.2018.2855408 2. Fan, L., Lei, X., Yang, N., Duong, T., Karagiannidis, G.: Secrecy cooperative networks with outdated relay selection over correlated fading channels. IEEE Trans. Veh. Technol. 66(8), 7599–7603 (2017). https://doi.org/10.1109/TVT.2017.2669240 3. Wong, M., Haj-Yahya, J., Sau, S., Chattopadhyay, A.: A new high throughput and area efficient SHA-3 implementation. In: 2018 IEEE International Symposium on Circuits and Systems (ISCAS), 27–30 May 2018, Florence, Italy (2018) 4. Kuila, S., Chawdhury, D., Pal, M.: On the SHA-3 hash algorithms. J. Math. Inform. 3 (2015). ISSN: 2349-0632 5. Chandran, N., Manual, E.: Performance analysis of modified SHA-3. In: International Conference on Emerging Trends in Engineering, Science and Technology (ICETEST-2015), vol. 24, pp. 904–910. Elsevier (2016). https://doi.org/10.1016/j.protcy.2016.05.168
|
|