2009
DOI: 10.1007/978-3-642-01440-6_19
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Hardware Architecture of SHA-256 Algorithm for Trusted Mobile Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
16
0

Year Published

2011
2011
2018
2018

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 22 publications
(16 citation statements)
references
References 11 publications
0
16
0
Order By: Relevance
“…Compared with the straightforward implementation and the compact architecture like ref-4, the saved areas of SM3 with our compact architecture are approximate 36% and 12%, respectively. If the SRAM is shared with other modules, the number can be up to 47% and 27%, and it is smaller than that of SHA-256 in [8].…”
Section: Implementation Resultsmentioning
confidence: 87%
“…Compared with the straightforward implementation and the compact architecture like ref-4, the saved areas of SM3 with our compact architecture are approximate 36% and 12%, respectively. If the SRAM is shared with other modules, the number can be up to 47% and 27%, and it is smaller than that of SHA-256 in [8].…”
Section: Implementation Resultsmentioning
confidence: 87%
“…Our design is also more compact than the work of E. B. Kavun and T. Yalcin [27] (about a factor of 4). We also compare our designs with the smallest SHA-1 and SHA-2 implementations from [32] and [30]. It shows that our design has about the same size as SHA-1 and needs about 36 % less area than SHA-2.…”
Section: Resultsmentioning
confidence: 96%
“…As below, we separately discuss other implementations of SHA-256 circuit and other implementations of HMAC-SHA-256 circuit. 6.1.1 Scan-based Attack against Other SHA-256 Circuit Implementations As far as we know, basic iterative SHA-256 circuit [29], [40], two-unrolled SHA-256 circuit [41], [42], pipelining SHA-256 circuit [43], [44], two-unrolled pipelining SHA-256 circuit [45], four-unrolled pipelining SHA-256 circuit [45], and compact SHA-256 circuit [46] are proposed as SHA-256 circuit implementations.…”
Section: Scan-based Attack Against Other Sha-256/hmac-sha-256 Circuitmentioning
confidence: 99%
“…We consider that we cannot apply our scan-based attack directly to this circuit implementation. Compact SHA-256 circuit [46] The compact implementation of the SHA-256 circuit runs one iteration of PHASE 2 of Algorithm 1 in several clock cycles, not in one clock cycle. In this case, if the timing when one register moves to another register during one iteration can be specified, we expect that the bit-transition groups can be also found out using the scan data obtained from the HMAC-SHA-256 circuit including this SHA-256 circuit implementation.…”
Section: ]mentioning
confidence: 99%