The password-based key derivation function Scrypt has been employed for many services and applications due to its protection ability. It has also been employed as a proof-of-work algorithm in blockchain implementations. Although this cryptographic hash function provides very high security, the processing speed and power consumption to generate a hashed block for the blockchain network are low-performance. In this paper, a high-speed and low-power hardware architecture of the Scrypt function is proposed to generate blocks for the Scrypt-based blockchain network. This architecture minimizes the number of main computational blocks to reduce the power consumption of the system. In addition, the proposed sharing resources and pipelined architect...
In this study, novel pipelined architectures, optimised in terms of throughput and throughput/area f...
Hashing functions play a fundamental role in modern cryptography. Such functions process data of fin...
Abstract-In this paper an efficient implementation of Ripemd-160 hash function is presented. Hash fu...
With the rapid growth of the Internet and digital communications, the volume of sensitive electronic...
The technical analysis used in determining which of the NESSIE candidates will be selected as a stan...
Cryptocurrencies rely on secure hashing algorithms and public key cryptography to keep transactions ...
ABSTRACT The new design methodology for secret-key block ciphers, based on introducing an optimum nu...
Abstract. The technical analysis used in determining which of the NESSIE candidates will be selected...
NESSIE is a 3-year research project (2000-2002). The goal of the project is to put forward some algo...
Hardware implementations of cryptographic algorithms are ubiquitous in contemporary computer systems...
NESSIE is a 3-year research project (2000-2002). The goal of the project is to put forward some algo...
This paper presents an accelerator design for the password recovery of sha256crypt based on hybrid C...
Each day, millions of users generate and interchange large volumes of information in various fields....
In this thesis, we introduce hash encryption functions which are widely used in a number of protocol...
Society is undergoing a paradigm shift where the Information and Communication Technology (ICT) revo...
In this study, novel pipelined architectures, optimised in terms of throughput and throughput/area f...
Hashing functions play a fundamental role in modern cryptography. Such functions process data of fin...
Abstract-In this paper an efficient implementation of Ripemd-160 hash function is presented. Hash fu...
With the rapid growth of the Internet and digital communications, the volume of sensitive electronic...
The technical analysis used in determining which of the NESSIE candidates will be selected as a stan...
Cryptocurrencies rely on secure hashing algorithms and public key cryptography to keep transactions ...
ABSTRACT The new design methodology for secret-key block ciphers, based on introducing an optimum nu...
Abstract. The technical analysis used in determining which of the NESSIE candidates will be selected...
NESSIE is a 3-year research project (2000-2002). The goal of the project is to put forward some algo...
Hardware implementations of cryptographic algorithms are ubiquitous in contemporary computer systems...
NESSIE is a 3-year research project (2000-2002). The goal of the project is to put forward some algo...
This paper presents an accelerator design for the password recovery of sha256crypt based on hybrid C...
Each day, millions of users generate and interchange large volumes of information in various fields....
In this thesis, we introduce hash encryption functions which are widely used in a number of protocol...
Society is undergoing a paradigm shift where the Information and Communication Technology (ICT) revo...
In this study, novel pipelined architectures, optimised in terms of throughput and throughput/area f...
Hashing functions play a fundamental role in modern cryptography. Such functions process data of fin...
Abstract-In this paper an efficient implementation of Ripemd-160 hash function is presented. Hash fu...