10th IEEE International Conference on Electronics, Circuits and Systems, 2003. ICECS 2003. Proceedings of the 2003
DOI: 10.1109/icecs.2003.1301967
|View full text |Cite
|
Sign up to set email alerts
|

VLSI implementation of the keyed-hash message authentication code for the wireless application protocol

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
21
0

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 22 publications
(21 citation statements)
references
References 5 publications
0
21
0
Order By: Relevance
“…The latter works are exploiting the characteristics of the SHA-1 hash function that requires a different non-linear function every 20 clock cycles (operations), assigning a pipeline stage to each round. Borrowing design elements from the implementations of [8] and [9], operation blocks are back rolled in a loop in order to minimize area requirements. This approach enables full operation of the four rounds in parallel and introduction of a 20 cycle latency to quadruple the throughput compared to [9].…”
Section: Insertion Of Pipeline Stagesmentioning
confidence: 99%
See 2 more Smart Citations
“…The latter works are exploiting the characteristics of the SHA-1 hash function that requires a different non-linear function every 20 clock cycles (operations), assigning a pipeline stage to each round. Borrowing design elements from the implementations of [8] and [9], operation blocks are back rolled in a loop in order to minimize area requirements. This approach enables full operation of the four rounds in parallel and introduction of a 20 cycle latency to quadruple the throughput compared to [9].…”
Section: Insertion Of Pipeline Stagesmentioning
confidence: 99%
“…Borrowing design elements from the implementations of [8] and [9], operation blocks are back rolled in a loop in order to minimize area requirements. This approach enables full operation of the four rounds in parallel and introduction of a 20 cycle latency to quadruple the throughput compared to [9]. In [12,17] more or less the same main concept has been used in order to implement the SHA-1 hash function applying in various ways four pipeline stages.…”
Section: Insertion Of Pipeline Stagesmentioning
confidence: 99%
See 1 more Smart Citation
“…The table shows that our design outperforms most of the other designs in speed. The only exceptions are the works of Selimis et al (2003) and Kitsos et al (2002). However, these two designs include only one hash function, whereas ours includes six integrated hash functions.…”
Section: Comparisonmentioning
confidence: 99%
“…Most of these works focus on HMAC-SHA-1 (McLoone and McCanny, 2002;Selimis et al, 2003). Some others implemented HMAC-MD5 and HMACSHA-1 (Haa et al, 2004;Lu and Lockwood, 2005;Wang et al, 2004).…”
Section: Introductionmentioning
confidence: 99%