Comparative study of Keccak SHA-3 implementations

A Dolmeta, M Martina, G Masera - Cryptography, 2023 - mdpi.com
This paper conducts an extensive comparative study of state-of-the-art solutions for
implementing the SHA-3 hash function. SHA-3, a pivotal component in modern …

Efficient FPGA implementation of the SHA-3 hash function

M Sundal, R Chaves - 2017 IEEE Computer Society Annual …, 2017 - ieeexplore.ieee.org
In this paper, three different approaches are considered for FPGA based implementations of
the SHA-3 hash functions. While the performance of proposed unfolded and pipelined …

On efficiency enhancement of SHA-3 for FPGA-based multimodal biometric authentication

MM Sravani, SA Durai - IEEE Transactions on Very Large Scale …, 2022 - ieeexplore.ieee.org
Synchronized padder block and a compact-dynamic round constant (RC) generator to
achieve highly efficient Keccak architecture are proposed in this work. The proposed design …

High throughput implementation of the keccak hash function using the nios-ii processor

A Sideris, T Sanida, M Dasygenis - Technologies, 2020 - mdpi.com
Presently, cryptographic hash functions play a critical role in many applications, such as
digital signature systems, security communications, protocols, and network security …

High throughput pipelined hardware implementation of the KECCAK hash function

H Mestiri, F Kahri, M Bedoui… - … on Signal, Image …, 2016 - ieeexplore.ieee.org
The cryptographic hash algorithm has been developed by designers with the goal to
enhance its performances in terms of frequency, throughput, power consumption and area …

Data quality monitoring considerations for implementation in high performance raw signal processing real-time systems with use in tokamak facilities

A Wojenski, KT Pozniak, P Linczuk… - Journal of Fusion …, 2020 - Springer
Data quality of the tokamaks diagnostics is often a neglected topic. In literature it is rather
rare to find considerations regarding the data quality received from the diagnostic systems' …

An optimal hardware implementation of the KECCAK hash function on virtex-5 FPGA

F Assad, F Elotmani, M Fettach… - … Conference on Systems …, 2019 - ieeexplore.ieee.org
Security has become a very demanding parameter in today's world of speed communication,
one of the methods to ensure information integrity is the use of hash function which …

FPGA implementation of new standard hash function Keccak

T Honda, H Guntur, A Satoh - 2014 IEEE 3rd Global Conference …, 2014 - ieeexplore.ieee.org
High-speed hardware for Keccak, which was selected as a new standard hash function
named SHA-3, was developed and its performance was evaluated against SHA-1 and-2 …

High frequency implementation of cryptographic hash function Keccak-512 on FPGA devices

SE Moumni, M Fettach… - International Journal of …, 2018 - inderscienceonline.com
Cryptographic hash functions have an important role in numerous cryptographic
mechanisms like computing digital signatures, checking data integrity, storing passwords …

Efficient countermeasure for reliable KECCAK architecture against fault attacks

H Mestiri, F Kahri, B Bouallegue… - … Conference on Anti …, 2017 - ieeexplore.ieee.org
The cryptographic KECCAK algorithm has been developed by the circuit architect with the
objective to enhance the design performances from frequency, throughput, efficiency, power …