2019
DOI: 10.1007/978-3-030-33509-0_52
|View full text |Cite
|
Sign up to set email alerts
|

A Configurable Implementation of the SHA-256 Hash Function

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2020
2020
2020
2020

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(5 citation statements)
references
References 12 publications
0
5
0
Order By: Relevance
“…To ensure a fair comparison with other existing SHA-256 architectures, such as [18], [19], [20], [21], [22], and [23], we synthesized the proposed CME double SHA-256 circuit on four Xilinx FPGA boards, including Kintex UltraScale (XCKU5P-ffva676-3-e), Virtex 7(XC7VX1140T-FLG1926-2), Artix 7 (XC7A200T-FBG484-1), and Zynq UltraScale+ ZCU102 (XCZU9EG-FFVB1156-2-e).…”
Section: Fpga Experiments 1) Fpga Synthesis Resultsmentioning
confidence: 99%
See 4 more Smart Citations
“…To ensure a fair comparison with other existing SHA-256 architectures, such as [18], [19], [20], [21], [22], and [23], we synthesized the proposed CME double SHA-256 circuit on four Xilinx FPGA boards, including Kintex UltraScale (XCKU5P-ffva676-3-e), Virtex 7(XC7VX1140T-FLG1926-2), Artix 7 (XC7A200T-FBG484-1), and Zynq UltraScale+ ZCU102 (XCZU9EG-FFVB1156-2-e).…”
Section: Fpga Experiments 1) Fpga Synthesis Resultsmentioning
confidence: 99%
“…The results are shown in Table 4. It is worth noting that the existing architectures in [18], [19], [20], [21], [22] and [23] are single SHA-256 architectures that must repeat the computation three times to generate a double SHA-256 hash value for Bitcoin mining. Thus, the number of clock cycles required to compute a double SHA-256 is tripled.…”
Section: Fpga Experiments 1) Fpga Synthesis Resultsmentioning
confidence: 99%
See 3 more Smart Citations