Lightweight implementations of SHA-3 candidates on FPGAs

JP Kaps, P Yalla, KK Surapathi, B Habib… - Progress in Cryptology …, 2011 - Springer
The NIST competition for developing the new cryptographic hash algorithm SHA-3 has
entered its third round. One evaluation criterion is the ability of the candidate algorithm to be …

Area-efficient FPGA implementations of the SHA-3 finalists

B Jungk, J Apfelbeck - 2011 International Conference on …, 2011 - ieeexplore.ieee.org
Secure cryptographic hash functions are core components in many applications like
challenge-response authentication systems or digital signature schemes. Many of these …

Compact hardware implementations of chacha, blake, threefish, and skein on fpga

N At, JL Beuchat, E Okamoto, I San… - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
The cryptographic hash functions BLAKE and Skein are built from the ChaCha stream cipher
and the tweakable Threefish block cipher, respectively. Interestingly enough, they are based …

[PDF][PDF] Efficient hardware implementations and hardware performance evaluation of SHA-3 finalists

K Latif, MM Rao, A Aziz, A Mahboob - The Third SHA-3 Candidate …, 2012 - researchgate.net
Cryptographic hash functions are at the heart of many information security applications like
digital signatures, message authentication codes (MACs), and other forms of authentication …

[PDF][PDF] Evaluation of compact FPGA implementations for all SHA-3 finalists

B Jungk - The Third SHA-3 Candidate Conference, 2012 - csrc.nist.rip
Secure cryptographic hash functions are core components in many applications like
challenge-response authentication systems or digital signature schemes. Many of these …

A low-area unified hardware architecture for the AES and the cryptographic hash function Grøstl

N At, JL Beuchat, E Okamoto, I San… - Journal of Parallel and …, 2017 - Elsevier
This article describes the design of a compact 8-bit coprocessor for the Advanced Encryption
standard (AES)(encryption, decryption, and key expansion) and the cryptographic hash …

Compact implementation of Threefish and Skein on FPGA

N At, JL Beuchat, I San - 2012 5th International Conference on …, 2012 - ieeexplore.ieee.org
The SHA-3 finalist Skein is built from the tweak able Threefish block cipher. In order to have
a better understanding of the computational efficiency of Skein (resource sharing, memory …

FPGA-based evaluation of cryptographic algorithms

B Jungk - 2015 - publikationen.ub.uni-frankfurt.de
Effiziente kryptographische Algorithmen sind ein wichtiger Grundstein für viele neue
Anwendungen, wie zum Beispiel das Internet der Dinge (IoT) oder kontaktlose …

Resource efficient implementation of keccak, Skein & JH algorithms on reconfigurable platform

A Aziz, K Latif - Cankaya University Journal of Science and …, 2016 - dergipark.org.tr
In this work, we present a compact hardware implementation of cryptographic hash
algorithms;[Keccak, Skein & JH] on Field Programmable Gate Array (FPGA) by using an …

[图书][B] Domain Specific High-Level Synthesis for Cryptographic Workloads

A Khalid, G Paul, A Chattopadhyay - 2019 - Springer
This era is witnessing a phenomenal increase in the amount and frequency of the
information exchange. The imminent Internet of Things paradigm underpins an network of …