A novel hardware architecture for enhancing the keccak hash function in fpga devices

A Sideris, T Sanida, M Dasygenis - Information, 2023 - mdpi.com
Hash functions are an essential mechanism in today's world of information security. It is
common practice to utilize them for storing and verifying passwords, developing pseudo …

Hardware acceleration design of the SHA-3 for high throughput and low area on FPGA

A Sideris, T Sanida, M Dasygenis - Journal of Cryptographic Engineering, 2024 - Springer
In sensitive communications, the cryptographic hash function plays a crucial role, including
in the military, healthcare, and banking, ensuring secure transmission by verifying data …

LiteHash: Hash Functions for Resource-Constrained Hardware

SD Achar, TP, S Nandi, S Nandi - ACM Transactions on Embedded …, 2024 - dl.acm.org
The global paradigm shift towards edge computing has led to a growing demand for efficient
integrity verification. Hash functions are one-way algorithms which act as a zero-knowledge …

CSIP: A Compact Scrypt IP design with single PBKDF2 core for Blockchain mining

VTD Le, PH Luan, TH Tran… - 2022 35th SBC/SBMicro …, 2022 - ieeexplore.ieee.org
Developing compact and energy-efficient Scrypt hardware for power-constrained devices is
necessary to balance the distribution of blockchain networks. However, existing Scrypt …

Revised elliptic curve cryptography multi-signature scheme (RECC-MSS) for enhancing security in electronic health record (EHR) system

G Uganya, RM Bommi… - Journal of Intelligent …, 2023 - content.iospress.com
Internet of things (IoT) is a recent developing technology in the field of smart healthcare. But
it is difficult to transfer the patient's health record as a centralized network. So,“blockchain …

An efficient heterogeneous parallel password recovery system on MT-3000

Y Luo, J Liu, C Gong, T Li - The Journal of Supercomputing, 2025 - Springer
Password-based recovery is a widely used method for regaining access to applications or
services when passwords are lost or forgotten. It is commonly used in electronic forensics by …

Claws: Contrastive learning with hard attention and weak supervision

J Herrera-Gerena, R Sundareswaran, J Just… - arXiv preprint arXiv …, 2021 - arxiv.org
Learning effective visual representations without human supervision is a long-standing
problem in computer vision. Recent advances in self-supervised learning algorithms have …

CTFE: A High-Efficient Heterogeneous Cryptographic CGRA for Diverse Security Applications

VTD Le, HL Pham, TH Tran, TH Vu… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Nowadays, cryptographic computation across various security applications necessitates the
development of hardware that is not only fast and power-efficient but also flexible enough to …

RHCP: A Reconfigurable High-efficient Cryptographic Processor for Decentralized IoT Platforms

VTD Le, HL Pham, TS Duong, TH Tran… - … on Knowledge and …, 2023 - ieeexplore.ieee.org
In decentralized IoT platforms, high flexibility, per-formance, and hardware efficiency are the
requirements for cryptographic hardware for maintaining data security. This paper proposes …

Power-efficient and programmable hashing accelerator for massive message processing

TS Duong, HL Pham, VTD Le, TH Tran… - 2023 IEEE 36th …, 2023 - ieeexplore.ieee.org
Ensuring security in modern domains such as blockchain and IoT requires developing
hashing hardware that is low-power, high-performance, and flexible with massive message …