2015 IEEE International Conference on Electronics, Computing and Communication Technologies (CONECCT) 2015
DOI: 10.1109/conecct.2015.7383912
|View full text |Cite
|
Sign up to set email alerts
|

High performance SHA-2 core using the Round Pipelined Technique

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 19 publications
(15 citation statements)
references
References 4 publications
0
9
0
Order By: Relevance
“…Mestiri et al [35] optimized the SHA256 and SHA512 serial algorithms on the Xilinx Virtex-5 FPGA to improve the performance/area ratio. Rote et al [36] optimized the structure of each round operation of SHA256 and SHA512 through the round pipelined technique to increase the algorithm frequency. Michail et al [37], [38] aimed at the SHA1 and SHA2 series hash algorithms using a variety of FPGA optimization techniques to achieve high-throughput and area-efficient multimode architectures, which can support single-or multimode algorithms of SHA1, SHA256 and SHA512.…”
Section: B Password Recovery Algorithmmentioning
confidence: 99%
“…Mestiri et al [35] optimized the SHA256 and SHA512 serial algorithms on the Xilinx Virtex-5 FPGA to improve the performance/area ratio. Rote et al [36] optimized the structure of each round operation of SHA256 and SHA512 through the round pipelined technique to increase the algorithm frequency. Michail et al [37], [38] aimed at the SHA1 and SHA2 series hash algorithms using a variety of FPGA optimization techniques to achieve high-throughput and area-efficient multimode architectures, which can support single-or multimode algorithms of SHA1, SHA256 and SHA512.…”
Section: B Password Recovery Algorithmmentioning
confidence: 99%
“…As below, we separately discuss other implementations of SHA-256 circuit and other implementations of HMAC-SHA-256 circuit. 6.1.1 Scan-based Attack against Other SHA-256 Circuit Implementations As far as we know, basic iterative SHA-256 circuit [29], [40], two-unrolled SHA-256 circuit [41], [42], pipelining SHA-256 circuit [43], [44], two-unrolled pipelining SHA-256 circuit [45], four-unrolled pipelining SHA-256 circuit [45], and compact SHA-256 circuit [46] are proposed as SHA-256 circuit implementations.…”
Section: Scan-based Attack Against Other Sha-256/hmac-sha-256 Circuitmentioning
confidence: 99%
“…When we can insert arbitrary messages into this SHA-256 circuit, we expect that STEP 2 and STEP 3 in the proposed method can be successfully applied to this circuit implementation. Pipelining SHA-256 circuit [43], [44] The pipelining implementation of the SHA-256 circuit processes PHASE 2 of Algorithm 1 in a pipelined manner. In this implementation, the processes on the left side (a partial circuit composed of the registers a, b, c and d) and the right side (a partial circuit composed of the registers e, f , g and h) in Fig.…”
Section: ]mentioning
confidence: 99%
“…From a hardware perspective, [7]- [22] proposed solutions to improve SHA-256. For instance, the authors of [7] employed the carry-save adder to improve the computation time of the critical path, which increased the maximum frequency and processing rate, while [8]- [12] used pipeline technology to improve the SHA-256 throughput. A cache memory technique was presented in [13] to reuse data, minimize the critical paths, and reduce the number of memory accesses for SHA-256 processing.…”
Section: Introductionmentioning
confidence: 99%