Secure Hash Algorithm-3 (SHA-3)
functions on binary data with the NIST FIPS 202 Standard. It supports
cryptographic hash functions (SHA3-224, SHA3-256, SHA3-384, and
SHA3-512). SHA-3 can be directly substituted for SHA-2 in current
applications and significantly improve the robustness of NIST's overall
hash algorithm toolkit. It provides two versions of SHA3 IP: SHA3 hash
engine and SHA3 hash engine with input buffer and padding logic. It is
flexible to select different versions based on various requirements.
CYB-SHA3 is an ideal solution for wireless communication, payment
products and IoT devices with high implementation performance. It is
fastly and easily integrated into ASIC and FPGA applications.
View Secure Hash Algorithm-3 (SHA-3) full description to...
- see the entire Secure Hash Algorithm-3 (SHA-3) datasheet
- get in contact with Secure Hash Algorithm-3 (SHA-3) Supplier
Block Diagram of the Secure Hash Algorithm-3 (SHA-3) IP Core
SHA3 IP
- Secure-IC Securyzr™ Tunable Cryptography solutions with embedded side-channel protections: AES - SHA2 - SHA3 - PKC - RSA - ECC - Crystals Kyber - Crystals Dilithium - XMSS - LMS - SM2 - SM3 - SM4 - Whirlpool - CHACHA20 - Poly1305
- Secure-IC's Securyzr™ Tunable Hash (SHA3) Hardware accelerator
- SHA-3 Secure Hash Function Core
- Secure-IC's Securyzr™ SHA-3 Crypto Engine
- SHA-3 Crypto IP Core
- SHA3 core for accelerating NIST FIPS 202 Secure Hash Algorithm