SHA-2 acceleration meeting the needs of emerging applications: A comparative survey

R Martino, A Cilardo - IEEE Access, 2020 - ieeexplore.ieee.org
While SHA-2 is a ubiquitous cryptographic hashing primitive, its role in emerging application
domains, eg blockchains or trusted IoT components, has made the acceleration of SHA-2 …

spongent: A Lightweight Hash Function

A Bogdanov, M Knežević, G Leander, D Toz… - … and Embedded Systems …, 2011 - Springer
This paper proposes spongent–a family of lightweight hash functions with hash sizes of 88
(for preimage resistance only), 128, 160, 224, and 256 bits based on a sponge construction …

Robust and reverse-engineering resilient PUF authentication and key-exchange by substring matching

M Rostami, M Majzoobi, F Koushanfar… - … on Emerging Topics …, 2014 - ieeexplore.ieee.org
This paper proposes novel robust and low-overhead physical unclonable function (PUF)
authentication and key exchange protocols that are resilient against reverse-engineering …

Architectural support for hypervisor-secure virtualization

J Szefer, RB Lee - ACM SIGPLAN Notices, 2012 - dl.acm.org
Virtualization has become a standard part of many computer systems. A key part of
virtualization is the all-powerful hypervisor which manages the physical platform and can …

SPONGENT: the design space of lightweight cryptographic hashing

A Bogdanov, M Knezevic, G Leander… - IEEE Transactions …, 2012 - ieeexplore.ieee.org
The design of secure yet efficiently implementable cryptographic algorithms is a
fundamental problem of cryptography. Lately, lightweight cryptography--optimizing the …

Optimizing sha256 in bitcoin mining

NT Courtois, M Grajek, R Naik - … , CSS 2014, Lublin, Poland, September 22 …, 2014 - Springer
Bitcoin is a “crypto currency”, a decentralized electronic payment scheme based on
cryptography. It implements a particular type of peer-to-peer payment system. Bitcoin …

A high-performance multimem SHA-256 accelerator for society 5.0

TH Tran, HL Pham, Y Nakashima - IEEE Access, 2021 - ieeexplore.ieee.org
The development of a low-cost high-performance secure hash algorithm (SHA)-256
accelerator has recently received extensive interest because SHA-256 is important in …

Lightweight post-quantum-secure digital signature approach for IoT motes

S Ghosh, R Misoczki, MR Sastry - Cryptology ePrint Archive, 2019 - eprint.iacr.org
Abstract Internet-of-Things (IoT) applications often require constrained devices to be
deployed in the field for several years, even decades. Protection of these tiny motes is …

A compact FPGA-based processor for the Secure Hash Algorithm SHA-256

R García, I Algredo-Badillo, M Morales-Sandoval… - Computers & Electrical …, 2014 - Elsevier
This work reports an efficient and compact FPGA processor for the SHA-256 algorithm. The
novel processor architecture is based on a custom datapath that exploits the reusing of …

On the exploitation of a high-throughput SHA-256 FPGA design for HMAC

HE Michail, GS Athanasiou, V Kelefouras… - ACM Transactions on …, 2012 - dl.acm.org
High-throughput and area-efficient designs of hash functions and corresponding
mechanisms for Message Authentication Codes (MACs) are in high demand due to new …