International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II 2005
DOI: 10.1109/itcc.2005.91
|View full text |Cite
|
Sign up to set email alerts
|

ASIC implementation of a unified hardware architecture for non-key based cryptographic hash primitives

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2007
2007
2021
2021

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 9 publications
0
6
0
Order By: Relevance
“…In Table 1, the work of [12] is a unified solution for MD5, SHA1 and RIPEMD160 so that the gate count is quite large. [13] used 0.13µm technology but it is much slower than our proposal which used [17] has a small cycle number and a large gate area due to the unfolding transformation with a large unfolding factor of 8.…”
Section: Synthesis Results and Comparisonmentioning
confidence: 99%
See 1 more Smart Citation
“…In Table 1, the work of [12] is a unified solution for MD5, SHA1 and RIPEMD160 so that the gate count is quite large. [13] used 0.13µm technology but it is much slower than our proposal which used [17] has a small cycle number and a large gate area due to the unfolding transformation with a large unfolding factor of 8.…”
Section: Synthesis Results and Comparisonmentioning
confidence: 99%
“…Many of the published papers combine multiple techniques to achieve a higher throughput. SHA1 is implemented in [7,[10][11][12][13][14], SHA2 is implemented in [4,5,[8][9][10]13], MD5 is implemented in [12][13][14][15][16] and RIPEMD-160 is implemented in [12,13,15].…”
Section: Related Workmentioning
confidence: 99%
“…While there exist several papers that analyze the combination of different block ciphers and hash functions (mostly combining MD5 with SHA-1, e.g., [24,25,26,27]), there exists only one publication that focuses on the combination of AES and Grøstl on FPGA platforms. Järvinen [28] analyzed various resource-sharing techniques to reduce the area requirements for an Altera Cyclone III.…”
Section: Related Workmentioning
confidence: 99%
“…Many of the published papers combine multiple techniques to achieve a higher throughput. SHA1 is implemented in [35,31,36,20,42,45], SHA2 in [12,13,33,11,31,42], MD5 in [20,42,45,37,25] and RIPEMD-160 in [20,42,37,27].…”
Section: Common Techniques Used For Efficient Hardware Implementationmentioning
confidence: 99%