peer reviewedSHA-512 is a member of the SHA-2 family of cryptographic hash algorithms that is based on a Davies-Mayer compression function operating on eight 64-bit words to produce a 512-bit digest. It provides strong resistance to collision and preimage attacks, and is assumed to remain secure in the dawning era of quantum computers. However, the compression function of SHA-512 is challenging to implement on small 8 and 16-bit microcontrollers because of their limited register space and the fact that 64-bit rotations are generally slow on such devices. In this paper, we present the first highly-optimized Assembler implementation of SHA-512 for the ATmega family of 8-bit AVR microcontrollers. We introduce a special optimization technique f...
Today, security is important on the network. Therefore, the security is provided by the nature of on...
Security has grown in importance as a study issue in recent years. Several cryptographic algorithms...
Recently, there have been many technological advancements in communication, particularly in online t...
SHA-512 is a member of the SHA-2 family of cryptographic hash algorithms that is based on a Davies-M...
peer reviewedThe enormous growth of the Internet of Things (IoT) in the recent past has fueled a str...
We present new software speed records for several popular hash functions on low-end 8-bit AVR microc...
The pervasive diffusion of electronic devices in security and privacy sensitive applications has boo...
In this study, novel pipelined architectures, optimised in terms of throughput and throughput/area f...
The development of a low-cost high-performance secure hash algorithm (SHA)-256 accelerator has recen...
In 2013 Intel will release the AVX2 instructions, which introduce 256-bit single-instruction multipl...
Hashing functions play a fundamental role in modern cryptography. Such functions process data of fin...
International audienceWe propose an improved implementation of the SHA-2 hash family, with minimal o...
Hash functions are utilized in the security layer of every communication protocol and in signature a...
Recent progress in quantum computing has increased interest in the question of how well the existing...
© International Association for Cryptologic Research 2015. Public-key cryptography based on the “rin...
Today, security is important on the network. Therefore, the security is provided by the nature of on...
Security has grown in importance as a study issue in recent years. Several cryptographic algorithms...
Recently, there have been many technological advancements in communication, particularly in online t...
SHA-512 is a member of the SHA-2 family of cryptographic hash algorithms that is based on a Davies-M...
peer reviewedThe enormous growth of the Internet of Things (IoT) in the recent past has fueled a str...
We present new software speed records for several popular hash functions on low-end 8-bit AVR microc...
The pervasive diffusion of electronic devices in security and privacy sensitive applications has boo...
In this study, novel pipelined architectures, optimised in terms of throughput and throughput/area f...
The development of a low-cost high-performance secure hash algorithm (SHA)-256 accelerator has recen...
In 2013 Intel will release the AVX2 instructions, which introduce 256-bit single-instruction multipl...
Hashing functions play a fundamental role in modern cryptography. Such functions process data of fin...
International audienceWe propose an improved implementation of the SHA-2 hash family, with minimal o...
Hash functions are utilized in the security layer of every communication protocol and in signature a...
Recent progress in quantum computing has increased interest in the question of how well the existing...
© International Association for Cryptologic Research 2015. Public-key cryptography based on the “rin...
Today, security is important on the network. Therefore, the security is provided by the nature of on...
Security has grown in importance as a study issue in recent years. Several cryptographic algorithms...
Recently, there have been many technological advancements in communication, particularly in online t...