Field programmable gate array applications—A scientometric review
Field Programmable Gate Array (FPGA) is a general purpose programmable logic device
that can be configured by a customer after manufacturing to perform from a simple logic gate …
that can be configured by a customer after manufacturing to perform from a simple logic gate …
Secure hash algorithms and the corresponding FPGA optimization techniques
Cryptographic hash functions are widely used primitives with a purpose to ensure the
integrity of data. Hash functions are also utilized in conjunction with digital signatures to …
integrity of data. Hash functions are also utilized in conjunction with digital signatures to …
FPGA-based SPHINCS+ Implementations: Mind the Glitch
The digital signature scheme SPHINCS+ is a candidate in the NIST post-quantum project,
whose aim is to standardize cryptographic systems that are secure against attacks …
whose aim is to standardize cryptographic systems that are secure against attacks …
A new high throughput and area efficient SHA-3 implementation
High performance and area efficient Secure Hash Algorithm (SHA-3) hardware realization is
investigated and proposed in this work. In addition to the new and simplified round constant …
investigated and proposed in this work. In addition to the new and simplified round constant …
Comparative study of Keccak SHA-3 implementations
This paper conducts an extensive comparative study of state-of-the-art solutions for
implementing the SHA-3 hash function. SHA-3, a pivotal component in modern …
implementing the SHA-3 hash function. SHA-3, a pivotal component in modern …
High throughput implementation of SHA3 hash algorithm on field programmable gate array (FPGA)
Cryptographic hash function is an essential element in sensitive communications, such as
banking, military and health. It ensures secure communication by checking data integrity …
banking, military and health. It ensures secure communication by checking data integrity …
Efficient FPGA implementation of the SHA-3 hash function
M Sundal, R Chaves - 2017 IEEE Computer Society Annual …, 2017 - ieeexplore.ieee.org
In this paper, three different approaches are considered for FPGA based implementations of
the SHA-3 hash functions. While the performance of proposed unfolded and pipelined …
the SHA-3 hash functions. While the performance of proposed unfolded and pipelined …
On efficiency enhancement of SHA-3 for FPGA-based multimodal biometric authentication
Synchronized padder block and a compact-dynamic round constant (RC) generator to
achieve highly efficient Keccak architecture are proposed in this work. The proposed design …
achieve highly efficient Keccak architecture are proposed in this work. The proposed design …
High speed FPGA implementation of cryptographic KECCAK hash function crypto-processor
Cryptographic hash functions are at the heart of many information security applications like
message authentication codes (MACs), digital signatures and other forms of authentication …
message authentication codes (MACs), digital signatures and other forms of authentication …
High performance pipelined FPGA implementation of the SHA-3 hash algorithm
L Ioannou, HE Michail… - 2015 4th Mediterranean …, 2015 - ieeexplore.ieee.org
The SHA-3 cryptographic hash algorithm is standardized in FIPS 202. We present a
pipelined hardware architecture supporting all the four SHA-3 modes of operation and a …
pipelined hardware architecture supporting all the four SHA-3 modes of operation and a …