Field programmable gate array applications—A scientometric review
Field Programmable Gate Array (FPGA) is a general purpose programmable logic device
that can be configured by a customer after manufacturing to perform from a simple logic gate …
that can be configured by a customer after manufacturing to perform from a simple logic gate …
Secure hash algorithms and the corresponding FPGA optimization techniques
Cryptographic hash functions are widely used primitives with a purpose to ensure the
integrity of data. Hash functions are also utilized in conjunction with digital signatures to …
integrity of data. Hash functions are also utilized in conjunction with digital signatures to …
[PDF][PDF] Keccak sponge function family main document
G Bertoni, J Daemen, M Peeters… - Submission to NIST …, 2009 - researchgate.net
Keccak [11] is a family of cryptographic hash functions [86] or, more accurately, sponge
functions [9]. This document describes the properties of the Keccak family and presents its …
functions [9]. This document describes the properties of the Keccak family and presents its …
High-speed hardware architectures and FPGA benchmarking of CRYSTALS-Kyber, NTRU, and Saber
Post-Quantum Cryptography (PQC) has emerged as a response of the cryptographic
community to the danger of attacks performed using quantum computers. All PQC schemes …
community to the danger of attacks performed using quantum computers. All PQC schemes …
Grøstl-a SHA-3 candidate
Grøstl is a SHA-3 candidate proposal. Grøstl is an iterated hash function with a compression
function built from two fixed, large, distinct permutations. The design of Grøstl is transparent …
function built from two fixed, large, distinct permutations. The design of Grøstl is transparent …
[BUCH][B] About cryptographic engineering
ÇK Koç - 2009 - Springer
Cryptographic engineering is the name we have coined to refer to the theory and practice of
engineering of cryptographic systems, ie, encryption and decryption engines, digital …
engineering of cryptographic systems, ie, encryption and decryption engines, digital …
Implementation and benchmarking of round 2 candidates in the NIST post-quantum cryptography standardization process using hardware and software/hardware co …
Performance in hardware has typically played a major role in differentiating among leading
candidates in cryptographic standardization efforts. Winners of two past NIST cryptographic …
candidates in cryptographic standardization efforts. Winners of two past NIST cryptographic …
ASIC-resistance of multi-hash proof-of-work mechanisms for blockchain consensus protocols
H Cho - IEEE Access, 2018 - ieeexplore.ieee.org
Blockchain technology rapidly gained popularity based on its open and decentralized
operation. Consensus protocol is the core mechanism of a blockchain network that securely …
operation. Consensus protocol is the core mechanism of a blockchain network that securely …
[PDF][PDF] FELICS-fair evaluation of lightweight cryptographic systems
FELICS – Fair Evaluation of Lightweight Cryptographic Systems Page 1 FELICS – Fair
Evaluation of Lightweight Cryptographic Systems Daniel Dinu, Alex Biryukov, Johann …
Evaluation of Lightweight Cryptographic Systems Daniel Dinu, Alex Biryukov, Johann …
Compact implementation and performance evaluation of block ciphers in ATtiny devices
The design of lightweight block ciphers has been a very active research topic over the last
years. However, the lack of comparative source codes generally makes it hard to evaluate …
years. However, the lack of comparative source codes generally makes it hard to evaluate …