Secure hash algorithms and the corresponding FPGA optimization techniques

ZA Al-Odat, M Ali, A Abbas, SU Khan - ACM Computing Surveys (CSUR), 2020 - dl.acm.org
Cryptographic hash functions are widely used primitives with a purpose to ensure the
integrity of data. Hash functions are also utilized in conjunction with digital signatures to …

Comparative study of Keccak SHA-3 implementations

A Dolmeta, M Martina, G Masera - Cryptography, 2023 - mdpi.com
This paper conducts an extensive comparative study of state-of-the-art solutions for
implementing the SHA-3 hash function. SHA-3, a pivotal component in modern …

SHA2 and SHA-3 accelerator design in a 7 nm technology within the European Processor Initiative

P Nannipieri, M Bertolucci, L Baldanzi, L Crocetti… - Microprocessors and …, 2021 - Elsevier
This paper proposes the architecture of the hash accelerator, developed in the framework of
the European Processor Initiative. The proposed circuit supports all the SHA2 and SHA-3 …

A new high throughput and area efficient SHA-3 implementation

MM Wong, J Haj-Yahya, S Sau… - … on Circuits and …, 2018 - ieeexplore.ieee.org
High performance and area efficient Secure Hash Algorithm (SHA-3) hardware realization is
investigated and proposed in this work. In addition to the new and simplified round constant …

Lightweight secure-boot architecture for risc-v system-on-chip

J Haj-Yahya, MM Wong, V Pudi… - … on Quality Electronic …, 2019 - ieeexplore.ieee.org
Securing thousands of connected, resource-constrained computing devices is a major
challenge nowadays. Adding to the challenge, third party service providers need regular …

High throughput implementation of SHA3 hash algorithm on field programmable gate array (FPGA)

S El Moumni, M Fettach, A Tragha - Microelectronics journal, 2019 - Elsevier
Cryptographic hash function is an essential element in sensitive communications, such as
banking, military and health. It ensures secure communication by checking data integrity …

On efficiency enhancement of SHA-3 for FPGA-based multimodal biometric authentication

MM Sravani, SA Durai - IEEE Transactions on Very Large Scale …, 2022 - ieeexplore.ieee.org
Synchronized padder block and a compact-dynamic round constant (RC) generator to
achieve highly efficient Keccak architecture are proposed in this work. The proposed design …

Implementation of TRNG with SHA-3 for hardware security

A Kamadi, Z Abbas - Microelectronics Journal, 2022 - Elsevier
Abstract Random Number Generators (RNGs) are the solution for cryptographic applications
to enhance hardware security. These RNGs ought to have three specific properties …

One primitive to diagnose them all: Architectural support for internet diagnostics

A Chen, A Haeberlen, W Zhou, BT Loo - Proceedings of the Twelfth …, 2017 - dl.acm.org
Today, network operators are increasingly playing the role of part-time detectives: they must
routinely diagnose intricate problems and malfunctions, eg, routing or performance issues …

[PDF][PDF] High-performance FPGA implementation of the secure hash algorithm 3 for single and multi-message processing

F Assad, M Fettach, F El Otmani… - International Journal of …, 2022 - academia.edu
The secure hash function has become the default choice for information security, especially
in applications that require data storing or manipulation. Consequently, optimized …