2017 7th International Symposium on Embedded Computing and System Design (ISED) 2017
DOI: 10.1109/ised.2017.8303943
|View full text |Cite
|
Sign up to set email alerts
|

An optimized pipelined architecture of SHA-256 hash function

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
15
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 25 publications
(15 citation statements)
references
References 8 publications
0
15
0
Order By: Relevance
“…On the Virtex 4 device, compared to that of the architectures in [19], [11], [10], and [21], the performance of our accelerator version 1-PE is 34 times, 1.6 times, 2.3 times, and 3.5 times better in terms of processing rate and 13.5 times, 1.4 times, 1.3 times, and 1.6 times better in terms of hardware efficiency, respectively.…”
Section: ) Fpga Synthesis Resultsmentioning
confidence: 94%
See 1 more Smart Citation
“…On the Virtex 4 device, compared to that of the architectures in [19], [11], [10], and [21], the performance of our accelerator version 1-PE is 34 times, 1.6 times, 2.3 times, and 3.5 times better in terms of processing rate and 13.5 times, 1.4 times, 1.3 times, and 1.6 times better in terms of hardware efficiency, respectively.…”
Section: ) Fpga Synthesis Resultsmentioning
confidence: 94%
“…For instance, unrolled architectures [6], [7] were implemented to improve the processing rate in trade-offs with large areas and high power consumption. Pipelined architectures have been developed in many works, such as [8], [9], and [10], to increase the processing rate of the SHA-256 core. Furthermore, [8] employed the parallel counter technique to reduce the circuit area and critical path delay.…”
Section: Introductionmentioning
confidence: 99%
“…Several optimizations of SHA-256 were recently published works. Some focused on optimizing SHA-256 hardware accelerator implementations for FPGA or ASIC by adopting pipelined architectures [16][17][18], while others adopted circuitlevel optimizations that shorten the critical path [19] or that reorder resource usage [20]. These works used a hardware description language (HDL) to implement the SHA-256 core and package it as an IP core [21].…”
Section: Related Workmentioning
confidence: 99%
“…Then, we calculate the processing rate for double SHA-256 (R d ) by using (10). The BlockSize is 1024 bits.…”
Section: ) Processing Rate and Hardware Efficiency Approachmentioning
confidence: 99%