Bitcoin and beyond: A technical survey on decentralized digital currencies

F Tschorsch, B Scheuermann - IEEE Communications Surveys …, 2016 - ieeexplore.ieee.org
Besides attracting a billion dollar economy, Bitcoin revolutionized the field of digital
currencies and influenced many adjacent areas. This also induced significant scientific …

[HTML][HTML] Green IoT and edge AI as key technological enablers for a sustainable digital transition towards a smart circular economy: An industry 5.0 use case

P Fraga-Lamas, SI Lopes, TM Fernández-Caramés - Sensors, 2021 - mdpi.com
Internet of Things (IoT) can help to pave the way to the circular economy and to a more
sustainable world by enabling the digitalization of many operations and processes, such as …

Application of resistive random access memory in hardware security: A review

G Rajendran, W Banerjee… - Advanced Electronic …, 2021 - Wiley Online Library
Nowadays, advancements in the design of trusted system environments are relying on
security provided by hardware‐based primitives, while replacing resource‐hungry software …

A practical evaluation on RSA and ECC-based cipher suites for IoT high-security energy-efficient fog and mist computing devices

M Suárez-Albela, P Fraga-Lamas… - Sensors, 2018 - mdpi.com
The latest Internet of Things (IoT) edge-centric architectures allow for unburdening higher
layers from part of their computational and data processing requirements. In the specific …

Beyond the wall: Near-data processing for databases

SL Xi, A Augusta, M Athanassoulis… - Proceedings of the 11th …, 2015 - dl.acm.org
The continuous growth of main memory size allows modern data systems to process entire
large scale datasets in memory. The increase in memory capacity, however, is not matched …

Fair and comprehensive methodology for comparing hardware performance of fourteen round two SHA-3 candidates using FPGAs

K Gaj, E Homsirikamol, M Rogawski - International Workshop on …, 2010 - Springer
Performance in hardware has been demonstrated to be an important factor in the evaluation
of candidates for cryptographic standards. Up to now, no consensus exists on how such an …

A high-efficiency FPGA-based multimode SHA-2 accelerator

HL Pham, TH Tran, VTD Le, Y Nakashima - IEEE Access, 2022 - ieeexplore.ieee.org
The secure hash algorithm 2 (SHA-2) family, including the SHA-224/256/384/512 hash
functions, is widely adopted in many modern domains, ranging from Internet of Things …

A high-performance multimem SHA-256 accelerator for society 5.0

TH Tran, HL Pham, Y Nakashima - IEEE Access, 2021 - ieeexplore.ieee.org
The development of a low-cost high-performance secure hash algorithm (SHA)-256
accelerator has recently received extensive interest because SHA-256 is important in …

SHA-2 acceleration meeting the needs of emerging applications: A comparative survey

R Martino, A Cilardo - IEEE Access, 2020 - ieeexplore.ieee.org
While SHA-2 is a ubiquitous cryptographic hashing primitive, its role in emerging application
domains, eg blockchains or trusted IoT components, has made the acceleration of SHA-2 …

ATHENa-automated tool for hardware evaluation: Toward fair and comprehensive benchmarking of cryptographic hardware using FPGAs

K Gaj, JP Kaps, V Amirineni… - … Conference on Field …, 2010 - ieeexplore.ieee.org
A fair comparison of functionally equivalent digital system designs targeting FPGAs is a
challenging and time consuming task. The results of the comparison depend on the inherent …