Lightweight implementations of SHA-3 candidates on FPGAs
The NIST competition for develo** the new cryptographic hash algorithm SHA-3 has
entered its third round. One evaluation criterion is the ability of the candidate algorithm to be …
entered its third round. One evaluation criterion is the ability of the candidate algorithm to be …
Area-efficient FPGA implementations of the SHA-3 finalists
B Jungk, J Apfelbeck - 2011 International Conference on …, 2011 - ieeexplore.ieee.org
Secure cryptographic hash functions are core components in many applications like
challenge-response authentication systems or digital signature schemes. Many of these …
challenge-response authentication systems or digital signature schemes. Many of these …
Compact hardware implementations of chacha, blake, threefish, and skein on fpga
The cryptographic hash functions BLAKE and Skein are built from the ChaCha stream cipher
and the tweakable Threefish block cipher, respectively. Interestingly enough, they are based …
and the tweakable Threefish block cipher, respectively. Interestingly enough, they are based …
[PDF][PDF] Efficient hardware implementations and hardware performance evaluation of SHA-3 finalists
Cryptographic hash functions are at the heart of many information security applications like
digital signatures, message authentication codes (MACs), and other forms of authentication …
digital signatures, message authentication codes (MACs), and other forms of authentication …
[PDF][PDF] Evaluation of compact FPGA implementations for all SHA-3 finalists
B Jungk - The Third SHA-3 Candidate Conference, 2012 - csrc.nist.rip
Secure cryptographic hash functions are core components in many applications like
challenge-response authentication systems or digital signature schemes. Many of these …
challenge-response authentication systems or digital signature schemes. Many of these …
A low-area unified hardware architecture for the AES and the cryptographic hash function Grøstl
This article describes the design of a compact 8-bit coprocessor for the Advanced Encryption
standard (AES)(encryption, decryption, and key expansion) and the cryptographic hash …
standard (AES)(encryption, decryption, and key expansion) and the cryptographic hash …
Compact implementation of Threefish and Skein on FPGA
The SHA-3 finalist Skein is built from the tweak able Threefish block cipher. In order to have
a better understanding of the computational efficiency of Skein (resource sharing, memory …
a better understanding of the computational efficiency of Skein (resource sharing, memory …
FPGA-based evaluation of cryptographic algorithms
B Jungk - 2015 - publikationen.ub.uni-frankfurt.de
Effiziente kryptographische Algorithmen sind ein wichtiger Grundstein für viele neue
Anwendungen, wie zum Beispiel das Internet der Dinge (IoT) oder kontaktlose …
Anwendungen, wie zum Beispiel das Internet der Dinge (IoT) oder kontaktlose …
Resource efficient implementation of keccak, Skein & JH algorithms on reconfigurable platform
In this work, we present a compact hardware implementation of cryptographic hash
algorithms;[Keccak, Skein & JH] on Field Programmable Gate Array (FPGA) by using an …
algorithms;[Keccak, Skein & JH] on Field Programmable Gate Array (FPGA) by using an …
[LIVRE][B] Domain Specific High-Level Synthesis for Cryptographic Workloads
This era is witnessing a phenomenal increase in the amount and frequency of the
information exchange. The imminent Internet of Things paradigm underpins an network of …
information exchange. The imminent Internet of Things paradigm underpins an network of …