Comparative study of Keccak SHA-3 implementations
This paper conducts an extensive comparative study of state-of-the-art solutions for
implementing the SHA-3 hash function. SHA-3, a pivotal component in modern …
implementing the SHA-3 hash function. SHA-3, a pivotal component in modern …
High performance post-quantum key exchange on FPGAs
Lattice-based cryptography is a highly potential candidate that protects against the threat of
quantum attack. At Usenix Security 2016, Alkim, Ducas, Pöpplemann, and Schwabe …
quantum attack. At Usenix Security 2016, Alkim, Ducas, Pöpplemann, and Schwabe …
Towards green cryptography: a comparison of lightweight ciphers from the energy viewpoint
We provide a comprehensive evaluation of several lightweight block ciphers with respect to
various hardware performance metrics, with a particular focus on the energy cost. This case …
various hardware performance metrics, with a particular focus on the energy cost. This case …
The hash function BLAKE
This book is about the cryptographic hash function BLAKE, one of the five final contenders in
the SHA3 competition, out of 64 initial submissions. The SHA3 competition was a public …
the SHA3 competition, out of 64 initial submissions. The SHA3 competition was a public …
Lightweight implementations of SHA-3 candidates on FPGAs
The NIST competition for develo** the new cryptographic hash algorithm SHA-3 has
entered its third round. One evaluation criterion is the ability of the candidate algorithm to be …
entered its third round. One evaluation criterion is the ability of the candidate algorithm to be …
Comprehensive evaluation of high-speed and medium-speed implementations of five SHA-3 finalists using **linx and Altera FPGAs
In this paper we present a comprehensive comparison of all Round 3 SHA-3 candidates and
the current standard SHA-2 from the point of view of hardware performance in modern …
the current standard SHA-2 from the point of view of hardware performance in modern …
Area-efficient FPGA implementations of the SHA-3 finalists
B Jungk, J Apfelbeck - 2011 International Conference on …, 2011 - ieeexplore.ieee.org
Secure cryptographic hash functions are core components in many applications like
challenge-response authentication systems or digital signature schemes. Many of these …
challenge-response authentication systems or digital signature schemes. Many of these …
Efficient FPGA implementation of the SHA-3 hash function
M Sundal, R Chaves - 2017 IEEE Computer Society Annual …, 2017 - ieeexplore.ieee.org
In this paper, three different approaches are considered for FPGA based implementations of
the SHA-3 hash functions. While the performance of proposed unfolded and pipelined …
the SHA-3 hash functions. While the performance of proposed unfolded and pipelined …
High throughput pipelined FPGA implementation of the new SHA-3 cryptographic hash algorithm
GS Athanasiou, GP Makkas… - 2014 6th International …, 2014 - ieeexplore.ieee.org
In this paper a two-staged pipelined architecture of the new SHA-3 (Keccak) algorithm is
presented. The core can operate on both one-block and multi-block messages, realizing all …
presented. The core can operate on both one-block and multi-block messages, realizing all …
On efficiency enhancement of SHA-3 for FPGA-based multimodal biometric authentication
Synchronized padder block and a compact-dynamic round constant (RC) generator to
achieve highly efficient Keccak architecture are proposed in this work. The proposed design …
achieve highly efficient Keccak architecture are proposed in this work. The proposed design …