FPGA based optimized SHA-3 finalist in reconfigurable hardware

Q Song, Y Wang, Z Li, Q Zhou, W Wu… - 2011 International …, 2011 - ieeexplore.ieee.org
A hash function is well-defined procedure to convert large, uncertain long message into
fixed small integers. Secure Hash Algorithm (SHA) is an one-way message digest algorithm …

Efficient high speed implementation of secure hash algorithm-3 on Virtex-5 FPGA

M Rao, T Newe, I Grout - 2014 17th Euromicro Conference on …, 2014 - ieeexplore.ieee.org
Cryptographic hash functions have many security based applications, particularly in
message authentication codes (MACs), digital signatures and data integrity. Secure Hash …

High performance pipelined FPGA implementation of the SHA-3 hash algorithm

L Ioannou, HE Michail… - 2015 4th Mediterranean …, 2015 - ieeexplore.ieee.org
The SHA-3 cryptographic hash algorithm is standardized in FIPS 202. We present a
pipelined hardware architecture supporting all the four SHA-3 modes of operation and a …

Fpga implementations of sha-3 candidates: cubehash, grøstl, lane, shabal and spectral hash

B Baldwin, A Byrne, M Hamilton… - 2009 12th Euromicro …, 2009 - ieeexplore.ieee.org
Hash functions are widely used in, and form an important part of many cryptographic
protocols. Currently, a public competition is underway to find a new hash algorithm (s) for …

Efficient FPGA implementation of secure hash algorithm grøstl–SHA-3 finalist

MM Rao, K Latif, A Aziz, A Mahboob - … , March 28-30, 2012. Proceedings 2, 2012 - Springer
Cryptographic hash functions are used for digital signatures; message authentication codes
(MACs) and other forms of authentication. National Institute of Standards and Technology …

High-performance implementation of a new hash function on FPGA

D Han, R Li, J Zeng - 2012 14th International Conference on …, 2012 - ieeexplore.ieee.org
Skein has the advantages of higher security (resisting against traditional attacks), faster
speed and selectable parameters. Therefore, it becomes a strong competitor for next …

Use of embedded FPGA resources in implementations of 14 round 2 SHA-3 candidates

R Shahid, MU Sharif, M Rogawski… - … Conference on Field …, 2011 - ieeexplore.ieee.org
In this paper, we present results of a comprehensive study devoted to the optimization of
FPGA implementations of modern cryptographic hash functions using embedded FPGA …

Design of high-throughput SHA-256 hash function based on FPGA

S binti Suhaili, T Watanabe - 2017 6th International …, 2017 - ieeexplore.ieee.org
Nowadays, security has become an important topic of interest to researchers. Different types
of cryptography algorithms have been developed in order to improve the performance of …

Ultra high throughput architectures for SHA-1 hash algorithm on FPGA

L Jiang, Y Wang, Q Zhao, Y Shao… - 2009 International …, 2009 - ieeexplore.ieee.org
This paper first presents a new architecture of SHA-1, which achieved the theoretical upper
bound on throughput in the iterative architecture. And then based on the general proposed …

Low area implementation of the hash function “blue midnight wish 256” for fpga platforms

M El-Hadedy, D Gligoroski… - … on Intelligent Networking …, 2009 - ieeexplore.ieee.org
In cryptography and information security, hash functions are considered as the" Swiss army
knife"-they are used in countless protocols and algorithms. In 2005, we witnessed a …