Modern reconfigurable technologies can have a number of inherent advantages for cryptanalytic applications. Aimed at the cryptanalysis of the SHA-1 hash function, this work explores this potential showing new approaches inherently based on hardware reconfigurability, enabling algorithm and architecture exploration, input-dependent system specialization, and low-level optimizations based on static/dynamic reconfiguration. As a result of this approach, we identified a number of new techniques, at both the algorithmic and architectural level, to effectively improve the attacks against SHA-1. We also defined the architecture of a high-performance FPGA-based cluster, that turns out to be the solution with the highest speed/cost ratio for SHA-1 c...
A secure cryptographic hashing function should be resistant to three different scenarios: First, a c...
Recently, there have been many technological advancements in communication, particularly in online t...
Abstract. This paper proposes the rescheduling of the SHA-1 hash function operations on hardware imp...
Modern reconfigurable technologies can have a number of inherent advantages for cryptanalytic applic...
After some recent breaks presented in the technical literature, it has become of paramount importanc...
SHA-1 is a widely used cryptographic hashing algorithm for validating the integrity of data. Until r...
Abstract—This paper presents a new set of techniques for hard-ware implementations of Secure Hash Al...
In this study, novel pipelined architectures, optimised in terms of throughput and throughput/area f...
International audienceIn this paper we analyze the security of the compression function of SHA-1 aga...
The latest cryptographical application demands in a typical embedded system demand both high speed a...
An analysis of hardware implementations of the cryptographic hash function SHA-1 based on pipeline c...
Secure Hash Algorithm-3 (SHA-3) is the most recent and efficient cryptography hash functions widely ...
We present in this article a freestart collision example for SHA-1, i.e., a collision for its intern...
Abstract—In this paper, we propose SHA-1 architectures to achieve high-throughput hardware implement...
International audienceSHA-1 is a widely used 1995 NIST cryptographic hash function standard that was...
A secure cryptographic hashing function should be resistant to three different scenarios: First, a c...
Recently, there have been many technological advancements in communication, particularly in online t...
Abstract. This paper proposes the rescheduling of the SHA-1 hash function operations on hardware imp...
Modern reconfigurable technologies can have a number of inherent advantages for cryptanalytic applic...
After some recent breaks presented in the technical literature, it has become of paramount importanc...
SHA-1 is a widely used cryptographic hashing algorithm for validating the integrity of data. Until r...
Abstract—This paper presents a new set of techniques for hard-ware implementations of Secure Hash Al...
In this study, novel pipelined architectures, optimised in terms of throughput and throughput/area f...
International audienceIn this paper we analyze the security of the compression function of SHA-1 aga...
The latest cryptographical application demands in a typical embedded system demand both high speed a...
An analysis of hardware implementations of the cryptographic hash function SHA-1 based on pipeline c...
Secure Hash Algorithm-3 (SHA-3) is the most recent and efficient cryptography hash functions widely ...
We present in this article a freestart collision example for SHA-1, i.e., a collision for its intern...
Abstract—In this paper, we propose SHA-1 architectures to achieve high-throughput hardware implement...
International audienceSHA-1 is a widely used 1995 NIST cryptographic hash function standard that was...
A secure cryptographic hashing function should be resistant to three different scenarios: First, a c...
Recently, there have been many technological advancements in communication, particularly in online t...
Abstract. This paper proposes the rescheduling of the SHA-1 hash function operations on hardware imp...