2007
DOI: 10.1016/j.sysarc.2006.09.006
|View full text |Cite
|
Sign up to set email alerts
|

Multi-mode operator for SHA-2 hash functions

Abstract: We propose an improved implementation of the SHA-2 hash family, with minimal operator latency and reduced hardware requirements. We also propose a high frequency version at the cost of only two cycles of latency per message. Finally we present a multi-mode architecture able to perform either a SHA-384 or SHA-512 hash or to behave as two independent SHA-224 or SHA-256 operators. Such capability adds increased flexibility for applications ranging from a server running multiple streams to independent pseudorandom… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
32
0

Year Published

2009
2009
2019
2019

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 45 publications
(33 citation statements)
references
References 6 publications
0
32
0
Order By: Relevance
“…In order to take advantage of the use of specialized cores or embedded systems, several architectures have been reported to iteratively operate without using parallelization or unrolling of the inner loop [8]. Other approaches consist on introducing a pre-computing stage in order to reduce the critical path.…”
Section: Secure Hash Algorithmsmentioning
confidence: 99%
See 2 more Smart Citations
“…In order to take advantage of the use of specialized cores or embedded systems, several architectures have been reported to iteratively operate without using parallelization or unrolling of the inner loop [8]. Other approaches consist on introducing a pre-computing stage in order to reduce the critical path.…”
Section: Secure Hash Algorithmsmentioning
confidence: 99%
“…The proposed architectures can be seen as single unrolled designs thus can be used as basis to explore architectures with several unrolled rounds. There are several commercial and academic implementations of the SHA-256 algorithm reported in the literature [8][9][10][11][12][13][14][15][16][17][18][19][20][21][22]. For the commercial implementations reported in [11] and [12], internal details of the architectures are not reported, thus they will not be included in the discussion.…”
Section: T Hroughput =mentioning
confidence: 99%
See 1 more Smart Citation
“…Glabb [8] describes an architecture that utilizes the similarity in processing of SHA-2s in implementation. The 64-bit data processing of SHA-384/512 is divided into two 32-bit data processing of SHA-224/256.…”
Section: Basic Pipeline Architecturesmentioning
confidence: 99%
“…However, the un- rolling architecture will increase the hardware size and decrease the frequency due to extra computations in each step. Multi-mode is given by Glabb [8] and Helion [13] but their performance rates are not really good due to complexity and low frequency. This paper describes fine-grained pipelining multimode SHA-384/512 architecture on FPGA in which one iteration computations of E and A (see Fig.…”
Section: Introductionmentioning
confidence: 99%