International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II 2005
DOI: 10.1109/itcc.2005.92
|View full text |Cite
|
Sign up to set email alerts
|

ASIC hardware focused comparison for hash functions MD5, RIPEMD-160, and SHS

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
13
0

Year Published

2005
2005
2015
2015

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 31 publications
(13 citation statements)
references
References 13 publications
0
13
0
Order By: Relevance
“…SHA-512 provides the utmost level of integrity preservation among all the hash functions with a large bit length [21], [22]. It produces authentication code of the message [23]. [24].…”
Section: Watermarking With Hashingmentioning
confidence: 99%
“…SHA-512 provides the utmost level of integrity preservation among all the hash functions with a large bit length [21], [22]. It produces authentication code of the message [23]. [24].…”
Section: Watermarking With Hashingmentioning
confidence: 99%
“…Several hardware techniques have been used to improve SHA performance [4][5][6][7][8][9]. These include the use of parallel counters and carry save adders (CSA) [4][5][6], loop unrolling to mitigate the serial dependence of hash computation [8], delay balancing [5], embedded memories [9] and pipelining [5] to improve throughput.…”
Section: Introductionmentioning
confidence: 99%
“…These include the use of parallel counters and carry save adders (CSA) [4][5][6], loop unrolling to mitigate the serial dependence of hash computation [8], delay balancing [5], embedded memories [9] and pipelining [5] to improve throughput. These techniques require significant additional hardware, resulting in higher area and reduced energy-efficiency.…”
Section: Introductionmentioning
confidence: 99%
“…Pramstaller et al [7] present a compact Whirlpool implementation on the Virtex XC2VP40 device, which utilises no Block RAM (BRAM), requires 1,276 slices and operates at 382 Mbps. There has been a significant amount of previous research into hardware architectures of other hash functions implemented on both FPGA [8][9][10][11][12][13][14][15] and ASIC technology [16,17]. These include a highly optimised SHA-512 architecture implemented on a Xilinx XCV1000 FPGA by Grembowski et al which achieves a throughput of 676 Mbps [9].…”
Section: Introductionmentioning
confidence: 99%
“…A number of the same authors have also designed a high-speed unrolled architecture [8], where the SHA-512 functionality is unrolled five times, which reduces the latency by a factor of 5, thus, increasing the overall throughput to 1 Gbps. Satoh and Inoue report a 2.9 Gbps SHA-512 ASIC design [16]. A high-speed ASIC design of the SHA-256 hash function is offered by Helion Technology, which runs at a speed of 1,885 Mbps [17].…”
Section: Introductionmentioning
confidence: 99%