2022
DOI: 10.3390/electronics11071068
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Architectures for Full Hardware Scrypt-Based Block Hashing System

Abstract: The password-based key derivation function Scrypt has been employed for many services and applications due to its protection ability. It has also been employed as a proof-of-work algorithm in blockchain implementations. Although this cryptographic hash function provides very high security, the processing speed and power consumption to generate a hashed block for the blockchain network are low-performance. In this paper, a high-speed and low-power hardware architecture of the Scrypt function is proposed to gene… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(2 citation statements)
references
References 29 publications
0
2
0
Order By: Relevance
“…Salsa20 is an original cipher function developed by Lam et al [16]. As a lightweight security, technique for exchanging meter read in and other information, Salsa20 uses stream cipher as the encryption mechanism.…”
Section: Salsa 20mentioning
confidence: 99%
“…Salsa20 is an original cipher function developed by Lam et al [16]. As a lightweight security, technique for exchanging meter read in and other information, Salsa20 uses stream cipher as the encryption mechanism.…”
Section: Salsa 20mentioning
confidence: 99%
“…In particular, for randomly selected inputs, if the i-th bit is flipped, then for any i and j, the j-th output bit will be flipped with a 50% probability -this is called the strict avalanche criterion (SAC). More generally, it may be necessary to flip a set of fixed length bits, and then change each output bit with a 50% probability 12,13 .…”
Section: Strict Avalanche Criterion (Sac)mentioning
confidence: 99%