A review on security implementations in soft-processors for IoT applications

MA Caraveo-Cacep, R Vázquez-Medina… - Computers & Security, 2024 - Elsevier
With the increase in the number of devices connected to the Internet, the need to maintain
and harden information security in Internet systems has significantly increased. This has led …

[PDF][PDF] Flexible and Scalable BLAKE/BLAKE2 Coprocessor for Blockchain-Based IoT Applications.

HL Pham, TH Tran, VTD Le, Y Nakashima - IEEE Des. Test, 2023 - researchgate.net
Developing flexible, high-processing-rate, and low-power BLAKE/BLAKE2 hardware is
extremely necessary for maintaining dependability, safety, and security in blockchainbased …

RHCP: A Reconfigurable High-efficient Cryptographic Processor for Decentralized IoT Platforms

VTD Le, HL Pham, TS Duong, TH Tran… - … on Knowledge and …, 2023 - ieeexplore.ieee.org
In decentralized IoT platforms, high flexibility, per-formance, and hardware efficiency are the
requirements for cryptographic hardware for maintaining data security. This paper proposes …

Power-efficient and programmable hashing accelerator for massive message processing

TS Duong, HL Pham, VTD Le, TH Tran… - 2023 IEEE 36th …, 2023 - ieeexplore.ieee.org
Ensuring security in modern domains such as blockchain and IoT requires developing
hashing hardware that is low-power, high-performance, and flexible with massive message …

Efficient and High-Speed CGRA Accelerator for Cryptographic Applications

VTD Le, HL Pham, TH Tran, TS Duong… - … on Computing and …, 2023 - ieeexplore.ieee.org
Efficient cryptographic hardware architectures must exhibit both high performance and
flexibility to effectively meet the diverse demands of data security in multi-domain …

Energy-Efficient Unified Multi-Hash Coprocessor for Securing IoT Systems Integrating Blockchain

PH Luan, TS Duong, VTD Le, TH Tran… - 2023 IEEE 66th …, 2023 - ieeexplore.ieee.org
SHA-256, BLAKE-256, and BLAKE2s are cryptographic hash functions widely used in data
security for Blockchain-enabled IoT systems to ensure the integrity of data and transactions …

High-efficiency Reconfigurable Crypto Accelerator Utilizing Innovative Resource Sharing and Parallel Processing

VTD Le, HL Pham, TH Tran, TS Duong… - 2023 IEEE 16th …, 2023 - ieeexplore.ieee.org
In decentralized IoT ecosystems, four cryptographic algorithms, including SHA256,
BLAKE256, BLAKE2s, and Chacha20, are principal to ensure data integrity and …

Design and Implementation of a Fully Pipelined and Parameterizable Hardware Accelerator for BLAKE2 Cryptographic Hash Function in FPGA

S Gauri, KN Sreehari… - 2023 3rd Asian …, 2023 - ieeexplore.ieee.org
Cryptographic hash functions play a pivotal role in ensuring the security and integrity of data
in various applications such as online banking, secure communications, and digital …