SHA-2 acceleration meeting the needs of emerging applications: A comparative survey

R Martino, A Cilardo - IEEE Access, 2020 - ieeexplore.ieee.org
While SHA-2 is a ubiquitous cryptographic hashing primitive, its role in emerging application
domains, eg blockchains or trusted IoT components, has made the acceleration of SHA-2 …

Optimizing sha256 in bitcoin mining

NT Courtois, M Grajek, R Naik - … , CSS 2014, Lublin, Poland, September 22 …, 2014 - Springer
Bitcoin is a “crypto currency”, a decentralized electronic payment scheme based on
cryptography. It implements a particular type of peer-to-peer payment system. Bitcoin …

Fair and comprehensive methodology for comparing hardware performance of fourteen round two SHA-3 candidates using FPGAs

K Gaj, E Homsirikamol, M Rogawski - International Workshop on …, 2010 - Springer
Performance in hardware has been demonstrated to be an important factor in the evaluation
of candidates for cryptographic standards. Up to now, no consensus exists on how such an …

A blockchain-assisted trusted clustering mechanism for IoT-enabled smart transportation system

KA Awan, IU Din, A Almogren - Sustainability, 2022 - mdpi.com
Vehicular Ad-hoc Network (VANET) is a modern concept of transportation that was
formulated by extending Mobile Ad-hoc Networks (MANETs). VANET presents diverse …

Enhancing security with in-depth analysis of brute-force attack on secure hashing algorithms

R Verma, N Dhanda, V Nagar - Proceedings of Trends in Electronics and …, 2022 - Springer
Brute-force attack is considered one of the oldest attacks in the entire history of
cybersecurity. Amid the diverse cyberattacks, the brute-force technique or exhaustive search …

Cost-efficient SHA hardware accelerators

R Chaves, G Kuzmanov, L Sousa… - IEEE transactions on …, 2008 - ieeexplore.ieee.org
This paper presents a new set of techniques for hardware implementations of secure hash
algorithm (SHA) hash functions. These techniques consist mostly in operation rescheduling …

Design of high-throughput SHA-256 hash function based on FPGA

S binti Suhaili, T Watanabe - 2017 6th International …, 2017 - ieeexplore.ieee.org
Nowadays, security has become an important topic of interest to researchers. Different types
of cryptography algorithms have been developed in order to improve the performance of …

Differential power analysis of HMAC based on SHA-2, and countermeasures

R McEvoy, M Tunstall, CC Murphy… - … Security Applications: 8th …, 2007 - Springer
The HMAC algorithm is widely used to provide authentication and message integrity to
digital communications. However, if the HMAC algorithm is implemented in embedded …

An optimized pipelined architecture of SHA-256 hash function

M Padhi, R Chaudhari - 2017 7th International Symposium on …, 2017 - ieeexplore.ieee.org
Real time applications of digital communication systems are rapidly increasing. Due to this
there is a huge demand for high level of security. In cryptographic algorithms, SHA-256 has …

On the exploitation of a high-throughput SHA-256 FPGA design for HMAC

HE Michail, GS Athanasiou, V Kelefouras… - ACM Transactions on …, 2012 - dl.acm.org
High-throughput and area-efficient designs of hash functions and corresponding
mechanisms for Message Authentication Codes (MACs) are in high demand due to new …