2012
DOI: 10.1007/s00779-012-0543-0
|View full text |Cite
|
Sign up to set email alerts
|

Compact and unified hardware architecture for SHA-1 and SHA-256 of trusted mobile computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(10 citation statements)
references
References 12 publications
0
10
0
Order By: Relevance
“…It is worth noting that the Padding Unit modifies only the last block of a message, leaving the others untouched. Since padding can be performed in software quite efficiently, without affecting the overall security of the system, many implementations [1], [76], [79], [80], [84], [85], [92], [93], [96]- [99] do not include the Padding Unit. These implementations take in already formatted PDBs.…”
Section: ) General Architecturementioning
confidence: 99%
See 2 more Smart Citations
“…It is worth noting that the Padding Unit modifies only the last block of a message, leaving the others untouched. Since padding can be performed in software quite efficiently, without affecting the overall security of the system, many implementations [1], [76], [79], [80], [84], [85], [92], [93], [96]- [99] do not include the Padding Unit. These implementations take in already formatted PDBs.…”
Section: ) General Architecturementioning
confidence: 99%
“…Possible improvements rely on special devices for implementing the shift register, such as block RAMs (BRAMs) or first-in, first-out memory queue (FIFO)s [85], or the shift register mode of the configurable logic blocks (CLBs) of Xilinx R FPGAs [81]. A folded implementation of the Expander, employing only one adder, is proposed instead in [78], [79]. The unrolled implementation of the Expander is presented in [91], [95].…”
Section: ) General Architecturementioning
confidence: 99%
See 1 more Smart Citation
“…When a node nk receives this packet, it can use PKp to verify the authenticity of OWHk0 and forwards the packet to the next node if the verification is passed. An elliptic curve public key scheme is implemented [11] on Berkeley motes and the cost is relatively low to perform one encryption or decryption process. To some extent, the public key approach is slow.…”
Section: Key Management Services For Lsddmentioning
confidence: 99%
“…A LSDD interest packet involves interest , blacklist , HMAC output of the packet, and the key of HMAC. We adopt SHA-1 [11] as HMAC function and key length is 32 bits (4 bytes). The output size of HMAC of SHA-1 is 20 bytes.…”
Section: Simulation and Performance Analysismentioning
confidence: 99%