2008
DOI: 10.1007/s11265-008-0168-8
|View full text |Cite
|
Sign up to set email alerts
|

Design Methodology for Throughput Optimum Architectures of Hash Algorithms of the MD4-class

Abstract: Abstract. In this paper we propose an architecture design methodology to optimize the throughput of MD4-based hash algorithms. The proposed methodology includes an iteration bound analysis of hash algorithms, which is the theoretical delay limit, and DFG (Data Flow Graph) transformations to achieve the iteration bound. We applied the methodology to some MD4-based hash algorithms such as SHA1, MD5 and RIPEMD-160. Since SHA1 is the algorithm which requires all the techniques we show, we also synthesized the tran… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0

Year Published

2009
2009
2013
2013

Publication Types

Select...
4
2

Relationship

3
3

Authors

Journals

citations
Cited by 8 publications
(10 citation statements)
references
References 16 publications
(31 reference statements)
0
10
0
Order By: Relevance
“…But with 6 and 8, the TP decreases, showing up the limit of the unfolding method due to operations added and more complex place-route step. We hope that this effect can be reduced with retiming method described in [9].…”
Section: A Analysis Of Our Implementation Resultsmentioning
confidence: 99%
See 4 more Smart Citations
“…But with 6 and 8, the TP decreases, showing up the limit of the unfolding method due to operations added and more complex place-route step. We hope that this effect can be reduced with retiming method described in [9].…”
Section: A Analysis Of Our Implementation Resultsmentioning
confidence: 99%
“…In order to improve performance, we perform an unfolding transformation [9] on P. This technique is often used in designs which have a NLFSR structure, such as some stream ciphers like Grain and Trivium; it is also interesting to measure its efficiency on Shabal, since one iteration in P is viewed as a NLFSR (see Fig. 2).…”
Section: B Unfolding Methods On Pmentioning
confidence: 99%
See 3 more Smart Citations