The National Institute of Standards and Technology (NIST) has started a competition for a new secure hash standard. To make a significant comparison between the submitted candidates, third party implementations of all proposed hash functions are needed. This is one of the reasons why the SHA-3 candidate Gr\{o}stl has been chosen for a FPGA-based implementation. Mainly our work is motivated by actual and future developments of the automotive market (e.g. car-2-car communication systems), which will increase the necessity for a suitable cryptographic infrastructure in modern vehicles (cf. AUTOSAR project) even further. One core component of such an infrastructure is a secure cryptographic hash function, which is used for a lot of applications...
Hash functions are widely used in Cryptography, and hardware implementations of hash functions are o...
High-throughput designs of hash functions are strongly demanded due to the need for security in ever...
The second round of the NIST public competition is underway to find a new hash algorithm(s) for incl...
has started a competition for a new secure hash standard. To make a significant comparison between t...
This article describes the design of an 8-bit coprocessor for the AES (encryption, decryption, and k...
Abstract. This work is motivated by future developments of mass mar-kets, where cryptographic infras...
Abstract—In this paper, we present results of a comprehensive study devoted to the optimization of F...
The NIST competition for developing the new cryptographic hash algorithm SHA-3 has entered its third...
Grøstl is a SHA-3 candidate proposal. Grøstl is an iterated hash function with a compression functio...
Hardware implementations of cryptographic algorithms are ubiquitous in contemporary computer systems...
Part 5: Implementations and Hardware Security 2International audienceAllowing good performances on d...
We present new software speed records for several popular hash functions on low-end 8-bit AVR microc...
In this study, novel pipelined architectures, optimised in terms of throughput and throughput/area f...
In this paper, the performances of SHA-3 final round candidates along with new versions of other has...
The secure hash function has become the default choice for information security, especially in appli...
Hash functions are widely used in Cryptography, and hardware implementations of hash functions are o...
High-throughput designs of hash functions are strongly demanded due to the need for security in ever...
The second round of the NIST public competition is underway to find a new hash algorithm(s) for incl...
has started a competition for a new secure hash standard. To make a significant comparison between t...
This article describes the design of an 8-bit coprocessor for the AES (encryption, decryption, and k...
Abstract. This work is motivated by future developments of mass mar-kets, where cryptographic infras...
Abstract—In this paper, we present results of a comprehensive study devoted to the optimization of F...
The NIST competition for developing the new cryptographic hash algorithm SHA-3 has entered its third...
Grøstl is a SHA-3 candidate proposal. Grøstl is an iterated hash function with a compression functio...
Hardware implementations of cryptographic algorithms are ubiquitous in contemporary computer systems...
Part 5: Implementations and Hardware Security 2International audienceAllowing good performances on d...
We present new software speed records for several popular hash functions on low-end 8-bit AVR microc...
In this study, novel pipelined architectures, optimised in terms of throughput and throughput/area f...
In this paper, the performances of SHA-3 final round candidates along with new versions of other has...
The secure hash function has become the default choice for information security, especially in appli...
Hash functions are widely used in Cryptography, and hardware implementations of hash functions are o...
High-throughput designs of hash functions are strongly demanded due to the need for security in ever...
The second round of the NIST public competition is underway to find a new hash algorithm(s) for incl...