The Second International Conference on Availability, Reliability and Security (ARES'07) 2007
DOI: 10.1109/ares.2007.17
|View full text |Cite
|
Sign up to set email alerts
|

A Reconfigurable Implementation of the New Secure Hash Algorithm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
18
0

Year Published

2009
2009
2021
2021

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(18 citation statements)
references
References 6 publications
0
18
0
Order By: Relevance
“…Our implementation makes the critical paths shorter than that of Chaves and removes five adders together with In comparison with commercial product as Helion [13], our work is much better in throughput and area performance terms, and achieves 30% better in throughput, although the area is only 2% bigger. Our area performance rate is 17% higher than Zeghid [4], although the throughput is 6% smaller due to the two steps unrolled architecture used by Zeghid. Since Aisopos [5] uses the hardware duplication technique, our hardware size is 73% smaller, and area performance rate is 39% better, but the throughput is 20% smaller.…”
Section: Comparison With Related Workmentioning
confidence: 90%
See 2 more Smart Citations
“…Our implementation makes the critical paths shorter than that of Chaves and removes five adders together with In comparison with commercial product as Helion [13], our work is much better in throughput and area performance terms, and achieves 30% better in throughput, although the area is only 2% bigger. Our area performance rate is 17% higher than Zeghid [4], although the throughput is 6% smaller due to the two steps unrolled architecture used by Zeghid. Since Aisopos [5] uses the hardware duplication technique, our hardware size is 73% smaller, and area performance rate is 39% better, but the throughput is 20% smaller.…”
Section: Comparison With Related Workmentioning
confidence: 90%
“…The reduction in number of steps helps these architectures to gain high throughput with low frequency. These architectures can be seen in Lien [2] with 5 steps unrolling, Zeghid [4] with two steps unrolling, and McEvoy [3] with two steps and 4 steps unrolling. Those unrolling architectures also often combine with the pipeline technique to increase the frequency.…”
Section: Unrolling Pipeline Architecturesmentioning
confidence: 99%
See 1 more Smart Citation
“…Reconfigurable architecture design is an interesting research topic of cryptosystem recently; among the existing reconfigurable designs, some focus on hash function, e.g., SHA-2 [12][13][14][15]; some focus on block cipher algorithm, e.g., AES [16,17]; some focus on public-key cryptography, e.g., elliptic curve cryptography [18,19]. Reconfigurable design can be configured for different mode up to the requirement of cryptosystem, provide different performance and flexibility, which is much more attractive than fixed architecture design.…”
Section: Fpga Implementationmentioning
confidence: 99%
“…The Blue Midnight Wish hash function (BMW) is one of the fastest (in software) proposed new designs in the SHA-3 competition in software [4]. In this paper, low area FPGA and ASIC implementations for Blue Midnight Wish compression function with digest size of 256 bits (BMW-256) [5] and comparison with others [6] are introduced.…”
Section: Introductionmentioning
confidence: 99%