2019
DOI: 10.1109/access.2019.2920089
|View full text |Cite
|
Sign up to set email alerts
|

A Flexible Framework for Exploring, Evaluating, and Comparing SHA-2 Designs

Abstract: Hash functions are a crucial tool in a large variety of applications, ranging from security protocols to cryptocurrencies down to the Internet-of-Things devices used, for example, as biomedical appliances. In particular, SHA-2 is today a ubiquitous hashing primitive. Its acceleration has driven a wealth of contributions in the technical literature and even a whole industry segment involving dedicated hash processing accelerators. Because of the variety of requirements in terms of performance, resources, and en… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
24
1

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 19 publications
(25 citation statements)
references
References 25 publications
0
24
1
Order By: Relevance
“…On the other hand, loop unrolling can be expected to be beneficial, despite the area increase, due to its frequency and register operation reduction. The experimental evaluation of [2] confirms the impact of loop unrolling, while other techniques appear not to have significant effects on power consumption. Loop folding has in fact twofold implications on power consumption.…”
Section: Power and Energy Consumptionmentioning
confidence: 56%
See 2 more Smart Citations
“…On the other hand, loop unrolling can be expected to be beneficial, despite the area increase, due to its frequency and register operation reduction. The experimental evaluation of [2] confirms the impact of loop unrolling, while other techniques appear not to have significant effects on power consumption. Loop folding has in fact twofold implications on power consumption.…”
Section: Power and Energy Consumptionmentioning
confidence: 56%
“…This implies that the overall effect of loop unrolling on throughput is technology-dependent. In [2] loop unrolling turns out to be beneficial for throughput on fairly recent FPGAs.…”
Section: A Performancementioning
confidence: 99%
See 1 more Smart Citation
“…To ensure a fair comparison with other existing SHA-256 architectures, such as [18], [19], [20], [21], [22], and [23], we synthesized the proposed CME double SHA-256 circuit on four Xilinx FPGA boards, including Kintex UltraScale (XCKU5P-ffva676-3-e), Virtex 7(XC7VX1140T-FLG1926-2), Artix 7 (XC7A200T-FBG484-1), and Zynq UltraScale+ ZCU102 (XCZU9EG-FFVB1156-2-e).…”
Section: Fpga Experiments 1) Fpga Synthesis Resultsmentioning
confidence: 99%
“…The authors of [17] used a combination of techniques such as carry-save-adders and pipelines to increase the performance of SHA-256. Pipeline and unrolled techniques are presented in [18] and [19] to increase the throughput of SHA-256. The authors of [20]- [22] presented a SHA-256 implementation on an FPGA for performance evaluation, with no technique optimization.…”
Section: Introductionmentioning
confidence: 99%