2011 International SoC Design Conference 2011
DOI: 10.1109/isocc.2011.6138786
|View full text |Cite
|
Sign up to set email alerts
|

Low area and high speed SHA-1 implementation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2012
2012
2021
2021

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 7 publications
0
3
0
Order By: Relevance
“…A detailed study has been carried out on the existing hardware designs of MISTY1, KASUMI, AES, SHA-1, CAMELLIA and SAFER [5][6][7][8][9][10][11][12][13][14][15][16][17][18][19][20][21][22]. The review covered the comparison of performance parameters i.e.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…A detailed study has been carried out on the existing hardware designs of MISTY1, KASUMI, AES, SHA-1, CAMELLIA and SAFER [5][6][7][8][9][10][11][12][13][14][15][16][17][18][19][20][21][22]. The review covered the comparison of performance parameters i.e.…”
Section: Introductionmentioning
confidence: 99%
“…In comparison to high throughput encryption cores, compact designs make use of the logic optimization techniques for transformation functions and s-boxes using combinational logic [5][6][7][8][9][10], [12][13][14][15][16][17][18], [21], [22]. Besides, re-utilization methodologies have also been implemented exploiting the rolling-feature of the architecture.…”
Section: Introductionmentioning
confidence: 99%
“…1. For high-throughput SHA-1 design, the techniques such as loop unfolding, pre-processing [2,3], multi-input adding based on a carry-save adder [4] and pipelining [5] have been proposed. In this paper, design methods that loop unfolding, preprocessing and pipelining were used.…”
Section: Introductionmentioning
confidence: 99%