SHA-2 acceleration meeting the needs of emerging applications: A comparative survey
R Martino, A Cilardo - IEEE Access, 2020 - ieeexplore.ieee.org
While SHA-2 is a ubiquitous cryptographic hashing primitive, its role in emerging application
domains, eg blockchains or trusted IoT components, has made the acceleration of SHA-2 …
domains, eg blockchains or trusted IoT components, has made the acceleration of SHA-2 …
A survey on FPGA support for the feasible execution of virtualized network functions
GS Niemiec, LMS Batista… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
Network Functions Virtualization (NFV) has received considerable attention in the past few
years, both from industry and academia, due to its potential for reducing capital and …
years, both from industry and academia, due to its potential for reducing capital and …
Designing a SHA-256 processor for blockchain-based IoT applications
R Martino, A Cilardo - Internet of Things, 2020 - Elsevier
An increasing number of Internet of Things applications have been recently considering the
use of the blockchain technology, calling for dedicated computational capabilities of the …
use of the blockchain technology, calling for dedicated computational capabilities of the …
A high-efficiency FPGA-based multimode SHA-2 accelerator
The secure hash algorithm 2 (SHA-2) family, including the SHA-224/256/384/512 hash
functions, is widely adopted in many modern domains, ranging from Internet of Things …
functions, is widely adopted in many modern domains, ranging from Internet of Things …
Hardware acceleration design of the SHA-3 for high throughput and low area on FPGA
In sensitive communications, the cryptographic hash function plays a crucial role, including
in the military, healthcare, and banking, ensuring secure transmission by verifying data …
in the military, healthcare, and banking, ensuring secure transmission by verifying data …
A high-throughput hardware implementation of SHA-256 algorithm
Y Chen, S Li - 2020 IEEE international symposium on circuits …, 2020 - ieeexplore.ieee.org
The SHA-256 algorithm is widely used in the field of security. In this paper, we propose a
rescheduling method for the SHA-256 round computation. Based on the proposed …
rescheduling method for the SHA-256 round computation. Based on the proposed …
LiteHash: Hash Functions for Resource-Constrained Hardware
The global paradigm shift toward edge computing has led to a growing demand for efficient
integrity verification. Hash functions are one-way algorithms which act as a zero-knowledge …
integrity verification. Hash functions are one-way algorithms which act as a zero-knowledge …
On the exploitation of a high-throughput SHA-256 FPGA design for HMAC
High-throughput and area-efficient designs of hash functions and corresponding
mechanisms for Message Authentication Codes (MACs) are in high demand due to new …
mechanisms for Message Authentication Codes (MACs) are in high demand due to new …
A new message expansion structure for full pipeline SHA-2
Y Zhang, Z He, M Wan, M Zhan… - … on Circuits and …, 2021 - ieeexplore.ieee.org
Once there are constant or infrequently changed bits (COIBs) in two adjacent input
messages of SHA-2, the switching power of input messages data registers (IMD-REGs) used …
messages of SHA-2, the switching power of input messages data registers (IMD-REGs) used …
Design and implementation of totally-self checking SHA-1 and SHA-256 hash functions' architectures
Many cryptographic primitives that are used in cryptographic schemes and security protocols
such as SET, PKI, IPSec and VPN's utilize hash functions-a special family of cryptographic …
such as SET, PKI, IPSec and VPN's utilize hash functions-a special family of cryptographic …