9th International Conference on Electronics, Circuits and Systems
DOI: 10.1109/icecs.2002.1046454
|View full text |Cite
|
Sign up to set email alerts
|

A hardware implementation of MD4-family hash algorithms

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
41
1

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 65 publications
(43 citation statements)
references
References 4 publications
1
41
1
Order By: Relevance
“…The performance of the separate implementation SHA-2(256) is slightly higher compared with the performance of the proposed system [24]. Comparing with previous implementations published in [6] the proposed system is 277 and 417% faster. The work of [14] achieves higher throughput compared with the proposed systems at about 3% and 36%, but with lower operation frequency at about 49% times.…”
Section: Introductionmentioning
confidence: 39%
See 2 more Smart Citations
“…The performance of the separate implementation SHA-2(256) is slightly higher compared with the performance of the proposed system [24]. Comparing with previous implementations published in [6] the proposed system is 277 and 417% faster. The work of [14] achieves higher throughput compared with the proposed systems at about 3% and 36%, but with lower operation frequency at about 49% times.…”
Section: Introductionmentioning
confidence: 39%
“…The proposed system throughput is worst In addition, comparisons of the proposed system implementation with other previous works are illustrated in the Table 4. Since the SHA-2 hash family is a new standard only few related works [6,14] have been published until now in the technical literature. In Table 4 comparisons with hash function standard (SHA-1) implementations [5,6,18,23] are also given.…”
Section: Vlsi Implementation Synthesis Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…DES proved to be fastest for ASIC implementations but is insecure. (Savas et al, 2005) 0.9 Gbps (Dominikus, 2002). MD5 2.09 Gbps (Savas et al, 2005) 5.86 Gbps (Joye and Quisquater, 2001) Different platforms have varying requirements.…”
Section: Performance and Security Analysis Of Hardware Implementationsmentioning
confidence: 99%
“…It calculates a 128-bit digest for an arbitrary l-bit message. It is an enhanced version of its predecessor MD4 [5] [6].The algorithm could be described in two stages: Preprocessing and Hash Computation. Preprocessing involves padding a message, parsing the padded message into m-bit blocks, and setting initialization values to be used in hash computation.…”
Section: Md-5 and Sha-1 Algorithmmentioning
confidence: 99%