2011 14th Euromicro Conference on Digital System Design 2011
DOI: 10.1109/dsd.2011.75
|View full text |Cite
|
Sign up to set email alerts
|

Novel Hardware Architecture for Implementing the Inner Loop of the SHA-2 Algorithms

Abstract: Cryptographic algorithms are used to enable security services that are the core of modern communication systems. In particular, Hash functions algorithms are widely used to provide services of data integrity and authentication. These algorithms are based on performing a number of complex operations on the input data, thus it is important to count with novel designs that can be efficiently mapped to hardware architectures. Hash functions perform internal operations in an iterative fashion, which open the possib… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
7
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(7 citation statements)
references
References 10 publications
(22 reference statements)
0
7
0
Order By: Relevance
“…This architecture is further optimised in [72] by observing that, due to data dependencies, the whole round function can be computed using only two CSAs without incurring any performance penalty, by properly scheduling the various additions. In [86], a reordering within the transformation round is proposed. The following variable is defined…”
Section: A Basic Architecturesmentioning
confidence: 99%
See 3 more Smart Citations
“…This architecture is further optimised in [72] by observing that, due to data dependencies, the whole round function can be computed using only two CSAs without incurring any performance penalty, by properly scheduling the various additions. In [86], a reordering within the transformation round is proposed. The following variable is defined…”
Section: A Basic Architecturesmentioning
confidence: 99%
“…The work in [86] pushes this approach further, proposing another precomputation based on the fact that D t = C t−1 again due to Equation (IV.1). The quantity τ t defined in Equation (V.1) can be precomputed during round t − 1 as 5…”
Section: Architectures With Precomputationmentioning
confidence: 99%
See 2 more Smart Citations
“…As below, we separately discuss other implementations of SHA-256 circuit and other implementations of HMAC-SHA-256 circuit. 6.1.1 Scan-based Attack against Other SHA-256 Circuit Implementations As far as we know, basic iterative SHA-256 circuit [29], [40], two-unrolled SHA-256 circuit [41], [42], pipelining SHA-256 circuit [43], [44], two-unrolled pipelining SHA-256 circuit [45], four-unrolled pipelining SHA-256 circuit [45], and compact SHA-256 circuit [46] are proposed as SHA-256 circuit implementations.…”
Section: Scan-based Attack Against Other Sha-256/hmac-sha-256 Circuitmentioning
confidence: 99%