The NIST competition for developing the new cryptographic hash algorithm SHA-3 has entered its third round. One evaluation criterion is the ability of the candidate algorithm to be implemented on resource-constrained platforms. This includes FPGAs for embedded and hand-held devices. In this paper we present two sets of lightweight implementations of all SHA-3 nalists and SHA-2, one using only logic resources (slices) and one which additionally uses one Block RAM. All implementations were designed to achieve maximum throughput while adhering to an area constraint of 800 slices or 400-600 slices and one Block RAM, respectively, on Xilinx Spartan-3 devices. We also synthesized them for Virtex-5, Altera Cyclone-II, and the new Xilinx Spartan-6 ...
In this paper we present a comprehensive comparison of all Round 3 SHA-3 candidates and the current ...
Hardware implementations of cryptographic algorithms are ubiquitous in contemporary computer systems...
The secure hash function has become the default choice for information security, especially in appli...
Abstract—In this paper, we present results of a comprehensive study devoted to the optimization of F...
Secure Hash Algorithm-3 (SHA-3) is the most recent and efficient cryptography hash functions widely ...
Part 5: Implementations and Hardware Security 2International audienceAllowing good performances on d...
The second round of the NIST public competition is underway to find a new hash algorithm(s) for incl...
Abstract—The second round of the NIST public competition is underway to find a new hash algorithm(s)...
.Efficient and high-throughput designs of hash functions will be in great demand in the next few yea...
Abstract. In this paper, we extend our evaluation of the hardware performance of 14 Round 2 SHA-3 ca...
Recent cryptanalysis on SHA-1 family has led the NIST to call for a public competition named SHA-3 C...
In this study, novel pipelined architectures, optimised in terms of throughput and throughput/area f...
Abstract—This paper presents a new set of techniques for hard-ware implementations of Secure Hash Al...
The competition of the NIST contenders in SHA-3 increased between the candidates hash functions to c...
Abstract. The NIST hash function competition to design a new crypto-graphic hash standard ‘SHA-3 ’ i...
In this paper we present a comprehensive comparison of all Round 3 SHA-3 candidates and the current ...
Hardware implementations of cryptographic algorithms are ubiquitous in contemporary computer systems...
The secure hash function has become the default choice for information security, especially in appli...
Abstract—In this paper, we present results of a comprehensive study devoted to the optimization of F...
Secure Hash Algorithm-3 (SHA-3) is the most recent and efficient cryptography hash functions widely ...
Part 5: Implementations and Hardware Security 2International audienceAllowing good performances on d...
The second round of the NIST public competition is underway to find a new hash algorithm(s) for incl...
Abstract—The second round of the NIST public competition is underway to find a new hash algorithm(s)...
.Efficient and high-throughput designs of hash functions will be in great demand in the next few yea...
Abstract. In this paper, we extend our evaluation of the hardware performance of 14 Round 2 SHA-3 ca...
Recent cryptanalysis on SHA-1 family has led the NIST to call for a public competition named SHA-3 C...
In this study, novel pipelined architectures, optimised in terms of throughput and throughput/area f...
Abstract—This paper presents a new set of techniques for hard-ware implementations of Secure Hash Al...
The competition of the NIST contenders in SHA-3 increased between the candidates hash functions to c...
Abstract. The NIST hash function competition to design a new crypto-graphic hash standard ‘SHA-3 ’ i...
In this paper we present a comprehensive comparison of all Round 3 SHA-3 candidates and the current ...
Hardware implementations of cryptographic algorithms are ubiquitous in contemporary computer systems...
The secure hash function has become the default choice for information security, especially in appli...