SHA-2 acceleration meeting the needs of emerging applications: A comparative survey

R Martino, A Cilardo - IEEE Access, 2020 - ieeexplore.ieee.org
While SHA-2 is a ubiquitous cryptographic hashing primitive, its role in emerging application
domains, eg blockchains or trusted IoT components, has made the acceleration of SHA-2 …

A survey on FPGA support for the feasible execution of virtualized network functions

GS Niemiec, LMS Batista… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
Network Functions Virtualization (NFV) has received considerable attention in the past few
years, both from industry and academia, due to its potential for reducing capital and …

Designing a SHA-256 processor for blockchain-based IoT applications

R Martino, A Cilardo - Internet of Things, 2020 - Elsevier
An increasing number of Internet of Things applications have been recently considering the
use of the blockchain technology, calling for dedicated computational capabilities of the …

A high-efficiency FPGA-based multimode SHA-2 accelerator

HL Pham, TH Tran, VTD Le, Y Nakashima - IEEE Access, 2022 - ieeexplore.ieee.org
The secure hash algorithm 2 (SHA-2) family, including the SHA-224/256/384/512 hash
functions, is widely adopted in many modern domains, ranging from Internet of Things …

Hardware acceleration design of the SHA-3 for high throughput and low area on FPGA

A Sideris, T Sanida, M Dasygenis - Journal of Cryptographic Engineering, 2024 - Springer
In sensitive communications, the cryptographic hash function plays a crucial role, including
in the military, healthcare, and banking, ensuring secure transmission by verifying data …

A high-throughput hardware implementation of SHA-256 algorithm

Y Chen, S Li - 2020 IEEE international symposium on circuits …, 2020 - ieeexplore.ieee.org
The SHA-256 algorithm is widely used in the field of security. In this paper, we propose a
rescheduling method for the SHA-256 round computation. Based on the proposed …

LiteHash: Hash Functions for Resource-Constrained Hardware

SD Achar, TP, S Nandi, S Nandi - ACM Transactions on Embedded …, 2025 - dl.acm.org
The global paradigm shift toward edge computing has led to a growing demand for efficient
integrity verification. Hash functions are one-way algorithms which act as a zero-knowledge …

On the exploitation of a high-throughput SHA-256 FPGA design for HMAC

HE Michail, GS Athanasiou, V Kelefouras… - ACM Transactions on …, 2012 - dl.acm.org
High-throughput and area-efficient designs of hash functions and corresponding
mechanisms for Message Authentication Codes (MACs) are in high demand due to new …

A new message expansion structure for full pipeline SHA-2

Y Zhang, Z He, M Wan, M Zhan… - … on Circuits and …, 2021 - ieeexplore.ieee.org
Once there are constant or infrequently changed bits (COIBs) in two adjacent input
messages of SHA-2, the switching power of input messages data registers (IMD-REGs) used …

Design and implementation of totally-self checking SHA-1 and SHA-256 hash functions' architectures

HE Michail, GS Athanasiou, G Theodoridis… - Microprocessors and …, 2016 - Elsevier
Many cryptographic primitives that are used in cryptographic schemes and security protocols
such as SET, PKI, IPSec and VPN's utilize hash functions-a special family of cryptographic …