Parallel cryptographic hash function based on cellular automata and random diffusion model

Y Yang, H Wan, X Yan, M Zhao, J Zeng, B Li - Applied Soft Computing, 2025 - Elsevier
The development of a cryptographic hash algorithm is a crucial task due to its numerous
practical applications, such as digital signatures, blockchain, and distributed systems …

[PDF][PDF] Flexible and Scalable BLAKE/BLAKE2 Coprocessor for Blockchain-Based IoT Applications.

HL Pham, TH Tran, VTD Le, Y Nakashima - IEEE Des. Test, 2023 - researchgate.net
Developing flexible, high-processing-rate, and low-power BLAKE/BLAKE2 hardware is
extremely necessary for maintaining dependability, safety, and security in blockchainbased …

RHCP: A Reconfigurable High-efficient Cryptographic Processor for Decentralized IoT Platforms

VTD Le, HL Pham, TS Duong, TH Tran… - … on Knowledge and …, 2023 - ieeexplore.ieee.org
In decentralized IoT platforms, high flexibility, per-formance, and hardware efficiency are the
requirements for cryptographic hardware for maintaining data security. This paper proposes …

Flexible and energy-efficient crypto-processor for arbitrary input length processing in blockchain-based iot applications

TD Vu, HL Pham, TH Tran… - IEICE Transactions on …, 2024 - search.ieice.org
Blockchain-based Internet of Things (IoT) applications require flexible, fast, and low-power
hashing hardware to ensure IoT data integrity and maintain blockchain network …

Efficient and High-Speed CGRA Accelerator for Cryptographic Applications

VTD Le, HL Pham, TH Tran, TS Duong… - … on Computing and …, 2023 - ieeexplore.ieee.org
Efficient cryptographic hardware architectures must exhibit both high performance and
flexibility to effectively meet the diverse demands of data security in multi-domain …

Hator: A High-Efficiency CGRA-Based 32/64-Bit Hashing Accelerator with Real-Time Performance Analysis

HH Nguyen, PH Luan, TH Vu, VTD Le… - 2024 IEEE 17th …, 2024 - ieeexplore.ieee.org
Developing hashing hardware to support diverse 32-bit and 64-bit hash functions at high
speed and with low power consumption is necessary to meet the varied security …

Design and Implementation of a Fully Pipelined and Parameterizable Hardware Accelerator for BLAKE2 Cryptographic Hash Function in FPGA

S Gauri, KN Sreehari… - 2023 3rd Asian …, 2023 - ieeexplore.ieee.org
Cryptographic hash functions play a pivotal role in ensuring the security and integrity of data
in various applications such as online banking, secure communications, and digital …

Versatile Resource-shared Cryptographic Accelerator for Multi-Domain Applications

VTD Le, HL Pham, TH Tran… - … Conference on IC …, 2023 - ieeexplore.ieee.org
SHA256, BLAKE256, BLAKE2s, Salsa20, and Chacha20 are crucial cryptographic
algorithms used for data security in multi-domain applications. Consequently, there is a …