A brief survey of cryptocurrency systems

U Mukhopadhyay, A Skjellum… - 2016 14th annual …, 2016 - ieeexplore.ieee.org
Cryptocurrencies have emerged as important financial software systems. They rely on a
secure distributed ledger data structure; mining is an integral part of such systems. Mining …

SHA-2 acceleration meeting the needs of emerging applications: A comparative survey

R Martino, A Cilardo - IEEE Access, 2020 - ieeexplore.ieee.org
While SHA-2 is a ubiquitous cryptographic hashing primitive, its role in emerging application
domains, eg blockchains or trusted IoT components, has made the acceleration of SHA-2 …

A case against currently used hash functions in RFID protocols

M Feldhofer, C Rechberger - … International Conferences" On the Move to …, 2006 - Springer
Designers of RFID security protocols can choose between a wide variety of cryptographic
algorithms. However, when implementing these algorithms on RFID tags fierce constraints …

Bitcoin mining technology

ND Bhaskar, C Wanfeng, L Haili, DLK Chuen - Handbook of digital …, 2024 - Elsevier
Bitcoin network functions on cryptographic technology and thrives on mining, an incentivized
technique to generate new bitcoins. In this paper, we describe the Bitcoin system's …

Optimisation of the SHA-2 family of hash functions on FPGAs

RP McEvoy, FM Crowe, CC Murphy… - … on Emerging VLSI …, 2006 - ieeexplore.ieee.org
Hash functions play an important role in modern cryptography. This paper investigates
optimisation techniques that have recently been proposed in the literature. A new VLSI …

A high-efficiency FPGA-based multimode SHA-2 accelerator

HL Pham, TH Tran, VTD Le, Y Nakashima - IEEE Access, 2022 - ieeexplore.ieee.org
The secure hash algorithm 2 (SHA-2) family, including the SHA-224/256/384/512 hash
functions, is widely adopted in many modern domains, ranging from Internet of Things …

Improving SHA-2 hardware implementations

R Chaves, G Kuzmanov, L Sousa… - … Hardware and Embedded …, 2006 - Springer
This paper proposes a set of new techniques to improve the implementation of the SHA-2
hashing algorithm. These techniques consist mostly in operation rescheduling and …

An experimental investigation into the hash functions used in blockchains

F Wang, Y Chen, R Wang, AO Francis… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
This article investigates how choosing a different hash function might affect the overall
performance of a blockchain. We focus on the selection of hash function for Ethereum and …

Cost-efficient SHA hardware accelerators

R Chaves, G Kuzmanov, L Sousa… - IEEE transactions on …, 2008 - ieeexplore.ieee.org
This paper presents a new set of techniques for hardware implementations of secure hash
algorithm (SHA) hash functions. These techniques consist mostly in operation rescheduling …

A compact FPGA-based processor for the Secure Hash Algorithm SHA-256

R García, I Algredo-Badillo, M Morales-Sandoval… - Computers & Electrical …, 2014 - Elsevier
This work reports an efficient and compact FPGA processor for the SHA-256 algorithm. The
novel processor architecture is based on a custom datapath that exploits the reusing of …