Recent cryptanalysis on SHA-1 family has led the NIST to call for a public competition named SHA-3 Contest. Efficient implementations on various platforms are a criterion for ranking performance of all the candidates in this competition. It appears that most of the hardware architectures proposed for SHA-3 candidates are basic. In this paper, we focus on an optimized implementation of the Shabal candidate. We improve the state-of-the-art using the unfolding method. This transformation leads to unroll a part of the Shabal core. More precisely, our design can produce a throughput over 3 Gbps on Virtex-5 FPGAs, with a reasonable area usage
Hash Function is widely used in the protocol scheme. In this paper, the design of SHA-1 hash functio...
In this paper, we analyze the theoretical delay bound of the SHA-1 algorithm and propose architectur...
The NIST run SHA-3 competition is nearing completion. Currently in its final round, the five remaini...
The original publication is available at www.springerlink.comInternational audienceIn this paper, we...
The NIST competition for developing the new cryptographic hash algorithm SHA-3 has entered its third...
In November 2007 NIST announced that it would organize the SHA-3 competition to select a new cryptog...
Security has grown in importance as a study issue in recent years. Several cryptographic algorithms...
Secure Hash Algorithm-3 (SHA-3) is the most recent and efficient cryptography hash functions widely ...
The secure hash function has become the default choice for information security, especially in appli...
In this paper we present a comprehensive comparison of all Round 3 SHA-3 candidates and the current ...
The cryptographic hash function is an essential element of sensitive communications, especially in b...
BLAKE is a cryptographic hash function proposed as a candidate in SHA-3 contest where he successfull...
Hash Function in cryptography algorithms is used to encrypt the message by giving the appropriate ou...
We present new software speed records for several popular hash functions on low-end 8-bit AVR microc...
.Efficient and high-throughput designs of hash functions will be in great demand in the next few yea...
Hash Function is widely used in the protocol scheme. In this paper, the design of SHA-1 hash functio...
In this paper, we analyze the theoretical delay bound of the SHA-1 algorithm and propose architectur...
The NIST run SHA-3 competition is nearing completion. Currently in its final round, the five remaini...
The original publication is available at www.springerlink.comInternational audienceIn this paper, we...
The NIST competition for developing the new cryptographic hash algorithm SHA-3 has entered its third...
In November 2007 NIST announced that it would organize the SHA-3 competition to select a new cryptog...
Security has grown in importance as a study issue in recent years. Several cryptographic algorithms...
Secure Hash Algorithm-3 (SHA-3) is the most recent and efficient cryptography hash functions widely ...
The secure hash function has become the default choice for information security, especially in appli...
In this paper we present a comprehensive comparison of all Round 3 SHA-3 candidates and the current ...
The cryptographic hash function is an essential element of sensitive communications, especially in b...
BLAKE is a cryptographic hash function proposed as a candidate in SHA-3 contest where he successfull...
Hash Function in cryptography algorithms is used to encrypt the message by giving the appropriate ou...
We present new software speed records for several popular hash functions on low-end 8-bit AVR microc...
.Efficient and high-throughput designs of hash functions will be in great demand in the next few yea...
Hash Function is widely used in the protocol scheme. In this paper, the design of SHA-1 hash functio...
In this paper, we analyze the theoretical delay bound of the SHA-1 algorithm and propose architectur...
The NIST run SHA-3 competition is nearing completion. Currently in its final round, the five remaini...