2022
DOI: 10.1109/tvlsi.2022.3148275
|View full text |Cite
|
Sign up to set email alerts
|

On Efficiency Enhancement of SHA-3 for FPGA-Based Multimodal Biometric Authentication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(7 citation statements)
references
References 41 publications
0
4
0
Order By: Relevance
“…Reduced Area at this stage compensates for the additional data path and Area rendered by the subsequent Bio-Hash skimmer and Fusion logic. Earlier reported architecture in [21], has been designed such that the padder and permutation modules operate in 'split-transfer' mode through handshake protocol. First, the message input converted to a sequence of 32/64 bits by padding, is processed to yield 'r' bits through a high throughput load-shift-store (LSS) scheme.…”
Section: B Sha-3 Architecture Reviewmentioning
confidence: 99%
See 2 more Smart Citations
“…Reduced Area at this stage compensates for the additional data path and Area rendered by the subsequent Bio-Hash skimmer and Fusion logic. Earlier reported architecture in [21], has been designed such that the padder and permutation modules operate in 'split-transfer' mode through handshake protocol. First, the message input converted to a sequence of 32/64 bits by padding, is processed to yield 'r' bits through a high throughput load-shift-store (LSS) scheme.…”
Section: B Sha-3 Architecture Reviewmentioning
confidence: 99%
“…1. The lead-lag counter logic initiates the first stage to perform the round operation for rounds (0-11) followed by the remaining round (12)(13)(14)(15)(16)(17)(18)(19)(20)(21)(22)(23) by the second stage. For the subsequent rounds 'counter 1' leads and the 'counter 2' lags.…”
Section: B Sha-3 Architecture Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…The introduction of SHA-3, with its unique SPONGE construction, aims to enhance cryptographic security and address potential vulnerabilities identified in SHA-1. A hardware implementation of SHA-3 has been explored in various studies [11,12,13,14,15,16,17,18,19,20]. Some studies [11,12] emphasize resource savings by employing the folding mechanism, which allows for the reuse of resources multiple times.…”
Section: Introductionmentioning
confidence: 99%
“…Enhancing the performance of a KECCAK circuit implemented in embedded circuits is a significant challenge. Currently, the KECCAK algorithm is used in a wide range of applications requiring high security, such as smart cards and mobile communication [ 2 , 3 , 4 , 5 , 6 , 7 , 8 , 9 ]. Consequently, there is a need to enhance the KECCAK algorithm’s resilience against multiple physical attacks, such as fault attacks.…”
Section: Introductionmentioning
confidence: 99%