Field programmable gate array applications—A scientometric review

J Ruiz-Rosero, G Ramirez-Gonzalez, R Khanna - Computation, 2019 - mdpi.com
Field Programmable Gate Array (FPGA) is a general purpose programmable logic device
that can be configured by a customer after manufacturing to perform from a simple logic gate …

Secure hash algorithms and the corresponding FPGA optimization techniques

ZA Al-Odat, M Ali, A Abbas, SU Khan - ACM Computing Surveys (CSUR), 2020 - dl.acm.org
Cryptographic hash functions are widely used primitives with a purpose to ensure the
integrity of data. Hash functions are also utilized in conjunction with digital signatures to …

[PDF][PDF] Keccak sponge function family main document

G Bertoni, J Daemen, M Peeters… - Submission to NIST …, 2009 - researchgate.net
Keccak [11] is a family of cryptographic hash functions [86] or, more accurately, sponge
functions [9]. This document describes the properties of the Keccak family and presents its …

High-speed hardware architectures and FPGA benchmarking of CRYSTALS-Kyber, NTRU, and Saber

VB Dang, K Mohajerani, K Gaj - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Post-Quantum Cryptography (PQC) has emerged as a response of the cryptographic
community to the danger of attacks performed using quantum computers. All PQC schemes …

Grøstl-a SHA-3 candidate

P Gauravaram, LR Knudsen, K Matusiewicz, F Mendel… - 2009 - drops.dagstuhl.de
Grøstl is a SHA-3 candidate proposal. Grøstl is an iterated hash function with a compression
function built from two fixed, large, distinct permutations. The design of Grøstl is transparent …

[BUCH][B] About cryptographic engineering

ÇK Koç - 2009 - Springer
Cryptographic engineering is the name we have coined to refer to the theory and practice of
engineering of cryptographic systems, ie, encryption and decryption engines, digital …

Implementation and benchmarking of round 2 candidates in the NIST post-quantum cryptography standardization process using hardware and software/hardware co …

VB Dang, F Farahmand, M Andrzejczak… - … ePrint Archive: Report …, 2020 - par.nsf.gov
Performance in hardware has typically played a major role in differentiating among leading
candidates in cryptographic standardization efforts. Winners of two past NIST cryptographic …

ASIC-resistance of multi-hash proof-of-work mechanisms for blockchain consensus protocols

H Cho - IEEE Access, 2018 - ieeexplore.ieee.org
Blockchain technology rapidly gained popularity based on its open and decentralized
operation. Consensus protocol is the core mechanism of a blockchain network that securely …

[PDF][PDF] FELICS-fair evaluation of lightweight cryptographic systems

D Dinu, A Biryukov, J Großschädl… - NIST Workshop on …, 2015 - csrc.nist.gov
FELICS – Fair Evaluation of Lightweight Cryptographic Systems Page 1 FELICS – Fair
Evaluation of Lightweight Cryptographic Systems Daniel Dinu, Alex Biryukov, Johann …

Compact implementation and performance evaluation of block ciphers in ATtiny devices

T Eisenbarth, Z Gong, T Güneysu, S Heyse… - Progress in Cryptology …, 2012 - Springer
The design of lightweight block ciphers has been a very active research topic over the last
years. However, the lack of comparative source codes generally makes it hard to evaluate …