2012 15th Euromicro Conference on Digital System Design 2012
DOI: 10.1109/dsd.2012.63
|View full text |Cite
|
Sign up to set email alerts
|

FPGA-based Design Approaches of Keccak Hash Function

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 27 publications
(13 citation statements)
references
References 3 publications
0
13
0
Order By: Relevance
“…The two implementations which propose [17] the hardware Keccak hash function described in this article, have been implemented in a FPGA Virtex-5 device. The author's design approaches include the use of DSP blocks that result in minimal use of traditional logical user, such as lookup tables (LUTs), pipelining that lead to increased time efficiency and combination of the two techniques.…”
Section: Related Workmentioning
confidence: 99%
“…The two implementations which propose [17] the hardware Keccak hash function described in this article, have been implemented in a FPGA Virtex-5 device. The author's design approaches include the use of DSP blocks that result in minimal use of traditional logical user, such as lookup tables (LUTs), pipelining that lead to increased time efficiency and combination of the two techniques.…”
Section: Related Workmentioning
confidence: 99%
“…The original message M of length n is taken for consideration and transformation of the alphanumeric characters into points on Elliptic Curve represented in Eq. (13).…”
Section: Novel Cryptographic Algorithmmentioning
confidence: 99%
“….In the proposed ECDSA model hidden generator point concept is applied to authenticate the encrypted message communicated between the devices connected in the perceptual layer of IoT [13], [14].…”
Section: Modified Elliptic Curve Digital Signature Algorithmmentioning
confidence: 99%
“…Here Keccak-f [1600], recognized as a new Secure Hash Algorithm-3, i.e. SHA-3 by NIST is considered in the digital signature generation and the digital signature verification processes [3]. Here the complexity of digital signature generation and digital signature verification is also analyzed to stop the attacker attempting to forge the signature.…”
Section: Introductionmentioning
confidence: 99%