2010 International Conference on Field Programmable Logic and Applications 2010
DOI: 10.1109/fpl.2010.84
|View full text |Cite
|
Sign up to set email alerts
|

FPGA Implementations of the Round Two SHA-3 Candidates

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
27
0
2

Year Published

2011
2011
2023
2023

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 69 publications
(29 citation statements)
references
References 6 publications
0
27
0
2
Order By: Relevance
“…The previous results most relevant to the subject of this paper belong to the category of High-Speed Implementations in FPGAs. The most comprehensive results belonging to this category have been reported in [5] [8][12] [13]. All these papers include results for all 14 Round 2 candidates.…”
Section: Previous Workmentioning
confidence: 99%
“…The previous results most relevant to the subject of this paper belong to the category of High-Speed Implementations in FPGAs. The most comprehensive results belonging to this category have been reported in [5] [8][12] [13]. All these papers include results for all 14 Round 2 candidates.…”
Section: Previous Workmentioning
confidence: 99%
“…There exist several Keccak implementations where most of them have been designed for FPGAs. Highspeed implementations have been reported by J. Strömbergson [39], B. Baldwin et al [3], E. Homsirikamol et al [22], K. Kobayashi et al [31], F. Gürkaynak et al [20], and K. Gaj et al [16,17]. Low-area FPGA designs have been presented by S. Kerckhof et al [29], J.-P. Kaps et al [26], and B. Jungk and J. Apfelbeck [25].…”
Section: Hash Functions For Rfidmentioning
confidence: 97%
“…Regarding the hardware implementations of Skein, the works presented in literature can be classified in two main categories. The first category includes the works that perform comparative studies among the candidates of NIST's hash competition [24][25][26][27][28][29][30][31][32][33][34][35][36][37][38][39][40][41]. The main goal of these works is not to develop sophisticated architectures but to study the performance of these algorithms when they are implemented in hardware.…”
Section: Introductionmentioning
confidence: 99%