2016 International Symposium on Signal, Image, Video and Communications (ISIVC) 2016
DOI: 10.1109/isivc.2016.7894001
|View full text |Cite
|
Sign up to set email alerts
|

High throughput pipelined hardware implementation of the KECCAK hash function

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
4
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
3
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 25 publications
(8 citation statements)
references
References 2 publications
0
4
0
Order By: Relevance
“…In the full proposed architecture, we obtain Fmax of 194.50 MHz, utilize 7702 ALMs, achieve the throughput of 28.02 Gbps, 26.46 Gbps, 20.24 Gbps, and 14.01 Gpbs and the efficiency of 3.63 Mbps/ALM, 3.43 Mbps/ALM, 2.62 Mbps/ALM, and 1.82 Mbps/ALM for SHA3-224, SHA3-256, SHA3-384, and SHA3-512, respectively. Compared to [9], we achieve 1.11 times in throughput and 0.67 times in efficiency for SHA3-512. Compared to [13], we achieve 1.86 times in throughput and 0.32 times in efficiency for SHA3-512 mode.…”
Section: Evaluation and Resultsmentioning
confidence: 94%
See 1 more Smart Citation
“…In the full proposed architecture, we obtain Fmax of 194.50 MHz, utilize 7702 ALMs, achieve the throughput of 28.02 Gbps, 26.46 Gbps, 20.24 Gbps, and 14.01 Gpbs and the efficiency of 3.63 Mbps/ALM, 3.43 Mbps/ALM, 2.62 Mbps/ALM, and 1.82 Mbps/ALM for SHA3-224, SHA3-256, SHA3-384, and SHA3-512, respectively. Compared to [9], we achieve 1.11 times in throughput and 0.67 times in efficiency for SHA3-512. Compared to [13], we achieve 1.86 times in throughput and 0.32 times in efficiency for SHA3-512 mode.…”
Section: Evaluation and Resultsmentioning
confidence: 94%
“…Additionally, a pipeline technique is applied within the RF. This approach, proposed by the authors in [9,10], involves the insertion of registers between the pi and chi functions to reduce critical path delays. In addition to improving performance, the designs in [8,10] also exhibit a high level of flexibility, enabling support for applications with multiple modes of SHA-3.…”
Section: Introductionmentioning
confidence: 99%
“…On this work [12], the authors propose a pipelined Keccak architecture. The proposed Keccak architecture is implemented on a Xilinx FPGA platform (Virtex-5) and simulated in ModelSim.…”
Section: Related Workmentioning
confidence: 99%
“…The introduction of SHA-3, with its unique SPONGE construction, aims to enhance cryptographic security and address potential vulnerabilities identified in SHA-1. A hardware implementation of SHA-3 has been explored in various studies [11,12,13,14,15,16,17,18,19,20]. Some studies [11,12] emphasize resource savings by employing the folding mechanism, which allows for the reuse of resources multiple times.…”
Section: Introductionmentioning
confidence: 99%