2020
DOI: 10.1016/j.iot.2020.100254
|View full text |Cite
|
Sign up to set email alerts
|

Designing a SHA-256 processor for blockchain-based IoT applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
25
1

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 37 publications
(26 citation statements)
references
References 10 publications
0
25
1
Order By: Relevance
“…nonce is the only field of the header that will be changed. This means that the miner may need to compute SHA 2 and SHA 3 up to 2 32 times for each calculation of SHA-256 1 . Therefore, our aim is to develop a hardware circuit to accelerate SHA 2 and SHA 3 with the assumption that SHA 1 has been computed by the microprocessor of the embedded system.…”
Section: A Proof Of Work Consensus and Double Sha-256mentioning
confidence: 99%
See 3 more Smart Citations
“…nonce is the only field of the header that will be changed. This means that the miner may need to compute SHA 2 and SHA 3 up to 2 32 times for each calculation of SHA-256 1 . Therefore, our aim is to develop a hardware circuit to accelerate SHA 2 and SHA 3 with the assumption that SHA 1 has been computed by the microprocessor of the embedded system.…”
Section: A Proof Of Work Consensus and Double Sha-256mentioning
confidence: 99%
“…Finally, the CPU forms a new block based on the valid hash found by the BCA and broadcasts the new block to the BC network. 32 values of nonce to find a valid hash value smaller than the target value. Then, the BCA is programmed to have nonce_step A = 2 26 , in which "D-PE 0", "D-PE i ", and "D-PE 63" compute for nonce ranging from 0 to A, (i × A) to ((i + 1) × A − 1), and (63 × A) to (64 × A − 1), respectively.…”
Section: Proposed Blockchain Accelerator (Bca)mentioning
confidence: 99%
See 2 more Smart Citations
“…SHA-2 is a family of 4 standardized hash algorithms: SHA-224, SHA-384, SHA-256, and SHA-512. SHA-2 is crucial and advantageously used in a wide range of emerging applications such as cloud computing [2], security of reconfigurable computing platforms [3], blockchains [4][5][6], big data [7] and internet of things (IoTs) [1] [8] [9]. Therefore, several works focused on improving the performance (e.g., hashing speed, and power consumption) of SHA-2 on targeted devices such as graphics processing units (GPUs) [10] or field-programmable gate arrays (FPGAs) [11].…”
Section: Introductionmentioning
confidence: 99%