2016
DOI: 10.17485/ijst/2016/v9i29/90026
|View full text |Cite
|
Sign up to set email alerts
|

Optimized Hardware Crypto Engines for XTEA and SHA-512 for Wireless Sensor Nodes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 13 publications
0
5
0
Order By: Relevance
“…Mohamed et al [32] optimized the SHA256 algorithm through 6-input LUTs and the carry-save adder (CSA) and compared the delays of the two schemes. Maashri et al [33] used reconfigurable hardware optimization to implement the XTEA and SHA512 algorithms. Huo et al [34] designed an application-specific instruction-set processor through hardware and software to realize various highperformance hash algorithms and meet the requirements of low cost and programmability.…”
Section: B Password Recovery Algorithmmentioning
confidence: 99%
“…Mohamed et al [32] optimized the SHA256 algorithm through 6-input LUTs and the carry-save adder (CSA) and compared the delays of the two schemes. Maashri et al [33] used reconfigurable hardware optimization to implement the XTEA and SHA512 algorithms. Huo et al [34] designed an application-specific instruction-set processor through hardware and software to realize various highperformance hash algorithms and meet the requirements of low cost and programmability.…”
Section: B Password Recovery Algorithmmentioning
confidence: 99%
“…Many existing schemes to collect data in WSN [18,[52][53][54] have used the SHA algorithm to support integrity and authentication. However, these schemes do not address the collision and preimage problems in the SHA algorithm [31][32][33][34][35].…”
Section: -Sha Familymentioning
confidence: 99%
“…It is worth mentioning that no significant attack and collisions on SHA-2 have been announced to date. The set of hash algorithms in the SHA-2 family includes SHA-224, SHA-256, SHA-384, and SHA-512 and generates digests of sizes 224, 256, 384, 512, respectively [33]. SHA-512 is one of the efficient member hash algorithm of SHA-2.…”
Section: Sha-512mentioning
confidence: 99%