Comparative study of Keccak SHA-3 implementations

A Dolmeta, M Martina, G Masera - Cryptography, 2023 - mdpi.com
This paper conducts an extensive comparative study of state-of-the-art solutions for
implementing the SHA-3 hash function. SHA-3, a pivotal component in modern …

High performance post-quantum key exchange on FPGAs

PC Kuo, WD Li, YW Chen, YC Hsu, BY Peng… - Cryptology ePrint …, 2017 - eprint.iacr.org
Lattice-based cryptography is a highly potential candidate that protects against the threat of
quantum attack. At Usenix Security 2016, Alkim, Ducas, Pöpplemann, and Schwabe …

Towards green cryptography: a comparison of lightweight ciphers from the energy viewpoint

S Kerckhof, F Durvaux, C Hocquet, D Bol… - … and Embedded Systems …, 2012 - Springer
We provide a comprehensive evaluation of several lightweight block ciphers with respect to
various hardware performance metrics, with a particular focus on the energy cost. This case …

The hash function BLAKE

JP Aumasson, W Meier, RCW Phan, L Henzen - 2014 - Springer
This book is about the cryptographic hash function BLAKE, one of the five final contenders in
the SHA3 competition, out of 64 initial submissions. The SHA3 competition was a public …

Lightweight implementations of SHA-3 candidates on FPGAs

JP Kaps, P Yalla, KK Surapathi, B Habib… - Progress in Cryptology …, 2011 - Springer
The NIST competition for develo** the new cryptographic hash algorithm SHA-3 has
entered its third round. One evaluation criterion is the ability of the candidate algorithm to be …

Comprehensive evaluation of high-speed and medium-speed implementations of five SHA-3 finalists using **linx and Altera FPGAs

K Gaj, E Homsirikamol, M Rogawski… - Cryptology ePrint …, 2012 - eprint.iacr.org
In this paper we present a comprehensive comparison of all Round 3 SHA-3 candidates and
the current standard SHA-2 from the point of view of hardware performance in modern …

Area-efficient FPGA implementations of the SHA-3 finalists

B Jungk, J Apfelbeck - 2011 International Conference on …, 2011 - ieeexplore.ieee.org
Secure cryptographic hash functions are core components in many applications like
challenge-response authentication systems or digital signature schemes. Many of these …

Efficient FPGA implementation of the SHA-3 hash function

M Sundal, R Chaves - 2017 IEEE Computer Society Annual …, 2017 - ieeexplore.ieee.org
In this paper, three different approaches are considered for FPGA based implementations of
the SHA-3 hash functions. While the performance of proposed unfolded and pipelined …

High throughput pipelined FPGA implementation of the new SHA-3 cryptographic hash algorithm

GS Athanasiou, GP Makkas… - 2014 6th International …, 2014 - ieeexplore.ieee.org
In this paper a two-staged pipelined architecture of the new SHA-3 (Keccak) algorithm is
presented. The core can operate on both one-block and multi-block messages, realizing all …

On efficiency enhancement of SHA-3 for FPGA-based multimodal biometric authentication

MM Sravani, SA Durai - IEEE Transactions on Very Large Scale …, 2022 - ieeexplore.ieee.org
Synchronized padder block and a compact-dynamic round constant (RC) generator to
achieve highly efficient Keccak architecture are proposed in this work. The proposed design …