Comparative study of Keccak SHA-3 implementations

A Dolmeta, M Martina, G Masera - Cryptography, 2023 - mdpi.com
This paper conducts an extensive comparative study of state-of-the-art solutions for
implementing the SHA-3 hash function. SHA-3, a pivotal component in modern …

A novel hardware architecture for enhancing the keccak hash function in fpga devices

A Sideris, T Sanida, M Dasygenis - Information, 2023 - mdpi.com
Hash functions are an essential mechanism in today's world of information security. It is
common practice to utilize them for storing and verifying passwords, developing pseudo …

Hardware acceleration design of the SHA-3 for high throughput and low area on FPGA

A Sideris, T Sanida, M Dasygenis - Journal of Cryptographic Engineering, 2024 - Springer
In sensitive communications, the cryptographic hash function plays a crucial role, including
in the military, healthcare, and banking, ensuring secure transmission by verifying data …

[PDF][PDF] An Ethereum Private Network for Data Management in Blockchain of Things Ecosystem.

A Al-Zoubi, T Saadeddin, M Dmour - Int. J. Online Biomed. Eng., 2023 - academia.edu
The advent of blockchain technology in the development and design of smart internet of
things (IoT) systems offers the opportunity to secure and transfer data flow, preserve its …

Design and Performance Evaluation of a Novel High-Speed Hardware Architecture for Keccak Crypto Coprocessor

M Sanlı - International Journal of Parallel Programming, 2024 - Springer
The Keccak algorithm plays a significant role in ensuring the security and confidentiality of
data in modern information systems. However, it involves computational complexities that …

An Improved Hardware Architecture of Ethereum Blockchain Hashing System

DK Lam, QL Phan, QT Nguyen, VQ Tran - International Conference on …, 2023 - Springer
Blockchain technology has become extremely popular, especially in recent years. It has
been successfully applied in the field of cryptocurrencies. Prominent is Ethereum, the most …