SHA-2 acceleration meeting the needs of emerging applications: A comparative survey

R Martino, A Cilardo - IEEE Access, 2020 - ieeexplore.ieee.org
While SHA-2 is a ubiquitous cryptographic hashing primitive, its role in emerging application
domains, eg blockchains or trusted IoT components, has made the acceleration of SHA-2 …

A survey on FPGA support for the feasible execution of virtualized network functions

GS Niemiec, LMS Batista… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
Network Functions Virtualization (NFV) has received considerable attention in the past few
years, both from industry and academia, due to its potential for reducing capital and …

Iso-x: A flexible architecture for hardware-managed isolated execution

D Evtyushkin, J Elwell, M Ozsoy… - 2014 47th Annual …, 2014 - ieeexplore.ieee.org
We consider the problem of how to provide an execution environment where the
application's secrets are safe even in the presence of malicious system software layers. We …

Designing a SHA-256 processor for blockchain-based IoT applications

R Martino, A Cilardo - Internet of Things, 2020 - Elsevier
An increasing number of Internet of Things applications have been recently considering the
use of the blockchain technology, calling for dedicated computational capabilities of the …

A high-efficiency FPGA-based multimode SHA-2 accelerator

HL Pham, TH Tran, VTD Le, Y Nakashima - IEEE Access, 2022 - ieeexplore.ieee.org
The secure hash algorithm 2 (SHA-2) family, including the SHA-224/256/384/512 hash
functions, is widely adopted in many modern domains, ranging from Internet of Things …

A high-performance multimem SHA-256 accelerator for society 5.0

TH Tran, HL Pham, Y Nakashima - IEEE Access, 2021 - ieeexplore.ieee.org
The development of a low-cost high-performance secure hash algorithm (SHA)-256
accelerator has recently received extensive interest because SHA-256 is important in …

BCA: A 530-mW multicore blockchain accelerator for power-constrained devices in securing decentralized networks

TH Tran, HL Pham, TD Phan… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Blockchain distributed ledger technology (DLT) has widespread applications in society 5.0
because it improves service efficiency and significantly reduces labor costs. However …

A coarse grained reconfigurable architecture for sha-2 acceleration

HL Pham, TH Tranl, VTD Le… - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
The development of high-speed SHA-2 hardware with high flexibility is urgently needed
because SHA-2 functions are widely employed in numerous fields, from loT devices to cryp …

Design and implementation of totally-self checking SHA-1 and SHA-256 hash functions' architectures

HE Michail, GS Athanasiou, G Theodoridis… - Microprocessors and …, 2016 - Elsevier
Many cryptographic primitives that are used in cryptographic schemes and security protocols
such as SET, PKI, IPSec and VPN's utilize hash functions-a special family of cryptographic …

A high-throughput hardware implementation of SHA-256 algorithm

Y Chen, S Li - 2020 IEEE international symposium on circuits …, 2020 - ieeexplore.ieee.org
The SHA-256 algorithm is widely used in the field of security. In this paper, we propose a
rescheduling method for the SHA-256 round computation. Based on the proposed …