2022 35th SBC/SBMicro/IEEE/ACM Symposium on Integrated Circuits and Systems Design (SBCCI) 2022
DOI: 10.1109/sbcci55532.2022.9893217
|View full text |Cite
|
Sign up to set email alerts
|

CSIP: A Compact Scrypt IP design with single PBKDF2 core for Blockchain mining

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
2

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 10 publications
0
3
0
Order By: Relevance
“…These encompass single-processor systems that leverage hardware accelerators (IPs) to boost performance and massively parallel architectures capitalizing on numerous processors operating in perfect synchronization. [28,29] Despite embedded systems finding application across multiple domains, their utilization within the blockchain domain, particularly in conjunction with FPGA technology, has remained relatively limited. Although FPGAs possess internal resources like high-speed memory and parallel computing blocks that are well-suited for computationally intensive applications, they have primarily been limited to PoW consensus mechanisms.…”
Section: Embedded System and Blockchainmentioning
confidence: 99%
“…These encompass single-processor systems that leverage hardware accelerators (IPs) to boost performance and massively parallel architectures capitalizing on numerous processors operating in perfect synchronization. [28,29] Despite embedded systems finding application across multiple domains, their utilization within the blockchain domain, particularly in conjunction with FPGA technology, has remained relatively limited. Although FPGAs possess internal resources like high-speed memory and parallel computing blocks that are well-suited for computationally intensive applications, they have primarily been limited to PoW consensus mechanisms.…”
Section: Embedded System and Blockchainmentioning
confidence: 99%
“…For instance, SHA-256 is commonly employed in password encryption, while BLAKE-256 and BLAKE2s are utilized for cryptographic key generation in biomedical image encryption and message authentication, respectively, in IoT and heterogeneous systems [24], [26]. Furthermore, diverse hash functions such as double SHA-256, Blake-256, and Scrypt are employed in different mining processes of different blockchain networks, such as Bitcoin, Decred, and Litecoin, respectively [5], [6], [11]. Practically, a versatile and reconfigurable cryptographic chip that can support multiple hash functions and accommodate arbitrary message lengths proves more cost-effective and time-efficient compared to the fabrication of multiple single-function dedicated cryptographic chips.…”
Section: Importance Of Flexible High-performance and Low-power Crypto...mentioning
confidence: 99%
“…In addition to their conventional use in security applications, hash functions have emerged as a fundamental and integral component of blockchain technology. For instance, hash functions, such as SHA-256, BLAKE-256, and BLAKE2s, are widely employed in blockchain networks to ensure the security and integrity of data transactions [5], [6].…”
Section: Introductionmentioning
confidence: 99%