2024
DOI: 10.1093/comjnl/bxae116
|View full text |Cite
|
Sign up to set email alerts
|

An optimized hardware implementation of SHA-256 round computation

Maoqun Yao,
Ziwei Xue,
Haiwei Li
et al.

Abstract: The SHA-256 algorithm is one of the most widely used secure hashing algorithms. The SHA-256 algorithm is implemented in hardware, and in order to ensure the integrity and authenticity of the encrypted data, this requires higher throughput and efficiency. In this paper, we propose a high-performance hardware architecture for the SHA-256 hash algorithm, which further optimizes the rearranged round computation by decomposing the critical path into two addition stages and replacing the multi-operator adder in the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Publication Types

Select...

Relationship

0
0

Authors

Journals

citations
Cited by 0 publications
references
References 14 publications
0
0
0
Order By: Relevance

No citations

Set email alert for when this publication receives citations?