2019 8th International Conference on Modern Circuits and Systems Technologies (MOCAST) 2019
DOI: 10.1109/mocast.2019.8741638
|View full text |Cite
|
Sign up to set email alerts
|

Hardware Acceleration of SHA-256 Algorithm Using NIOS-II Processor

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
6
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
6
1

Relationship

3
4

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 5 publications
0
6
0
Order By: Relevance
“…The key characteristics that set these functions apart from one another are their relative sizes, particularly those of the operators, the initiators, and the final message expression. [24]. The user has provided a numerical reference of [25], and it is being used here.…”
Section: International Journal On Recent and Innovation Trends In Com...mentioning
confidence: 99%
“…The key characteristics that set these functions apart from one another are their relative sizes, particularly those of the operators, the initiators, and the final message expression. [24]. The user has provided a numerical reference of [25], and it is being used here.…”
Section: International Journal On Recent and Innovation Trends In Com...mentioning
confidence: 99%
“…In our experimentations, we utilised the processor NIOS II/f, as shown in Figure 1. Its main characteristics are operation with a 6-stage pipeline to gain the external interrupt controller, custom instructions, highest DMIPS/MHz and optional hardware multiply to improve arithmetic performance [28,29].…”
Section: Nios II -Soft-core Embedded Processormentioning
confidence: 99%
“…www.jenrs.comJournal of Engineering Research and Sciences, 1(7):[20][21][22][23][24][25][26][27][28] 2022 …”
mentioning
confidence: 99%
“…They organized a three-round contest to replace the SHA-2 hashing standard, which was considered relatively secure at the time. The contest sought to identify a new hashing standard that could withstand potential attacks and provide robust security [9][10][11].…”
Section: Introductionmentioning
confidence: 99%