Proceedings of the 3rd International Conference on Security of Information and Networks 2010
DOI: 10.1145/1854099.1854135
|View full text |Cite
|
Sign up to set email alerts
|

Efficient hardware implementations of high throughput SHA-3 candidates keccak, luffa and blue midnight wish for single- and multi-message hashing

Abstract: In November 2007 NIST announced that it would organize the SHA-3 competition to select a new cryptographic hash function family by 2012. In the selection process, hardware performances of the candidates will play an important role. Our analysis of previously proposed hardware implementations shows that three SHA-3 candidate algorithms can provide superior performance in hardware: Keccak, Luffa and Blue Midnight Wish (BMW). In this paper, we provide efficient and fast hardware implementations of these three alg… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
18
1
1

Year Published

2011
2011
2021
2021

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 38 publications
(20 citation statements)
references
References 6 publications
0
18
1
1
Order By: Relevance
“…In [12], results for 256-bit and 512-bit variants of all algorithms, implemented using 10 FPGA families from Xilinx and Altera are discussed. Additionally, pipelined implementations of three Round 2 SHA-3 candidates have been investigated in [4].…”
Section: Previous Workmentioning
confidence: 99%
“…In [12], results for 256-bit and 512-bit variants of all algorithms, implemented using 10 FPGA families from Xilinx and Altera are discussed. Additionally, pipelined implementations of three Round 2 SHA-3 candidates have been investigated in [4].…”
Section: Previous Workmentioning
confidence: 99%
“…Tan et al proposed a server-less authentication protocol that also utilizes a known hash function between the reader and the tags, and XOR primitives. All these protocols are light-weight but have some security flaws which can be 10500 [12] 1500 [37] manipulated by the adversaries to attack the system. For instance, the protocol proposed by Henrici et al maintains a session number to synchronize the tag and the reader which can be easily manipulated by a malicious attacker by interrogating the tag in a middle step of the authentication process, and thus desynchronizing the tag and the reader [49].…”
Section: Low-resource Communication and Computationmentioning
confidence: 99%
“…In view of ASIC designs, there exist many high-speed variants proposed by S. Tillich et al [40], A. Akin et al [1], L. Henzen et al [21], and X. Guo et al [19].…”
Section: Hash Functions For Rfidmentioning
confidence: 99%