2014
DOI: 10.1007/978-3-319-07013-1_42
|View full text |Cite
|
Sign up to set email alerts
|

Low Cost FPGA Devices in High Speed Implementations of Keccak-f Hash Algorithm

Abstract: Abstract. Cryptographic hash functions are important components in many applications of contemporary information systems like computation of digital signatures, authentication codes or fingerprinting. The recent SHA-3 competition announced by NIST resulted in developments of new hash methods from which the Keccak algorithm has been selected as the winner after intensive public evaluation of the candidates. In this paper we are discussing various high-speed organizations of the Keccak-f[1600] permutation functi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 6 publications
0
4
0
Order By: Relevance
“…As described in [5,6], the FPGA Spartan-3 is a hardware platform that allows the considered hash algorithms to be run, highlighting major performance parameters from which a substantial advantage for the Keccak algorithm can be seen.…”
Section: Fpga-based Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…As described in [5,6], the FPGA Spartan-3 is a hardware platform that allows the considered hash algorithms to be run, highlighting major performance parameters from which a substantial advantage for the Keccak algorithm can be seen.…”
Section: Fpga-based Resultsmentioning
confidence: 99%
“…The algorithms of interest are run on an ARM Cortex A9-based platform, ranked according to their performances and compared to those obtained by means of an FPGA circuit as described in [5,6].…”
Section: Procedures Detailsmentioning
confidence: 99%
See 1 more Smart Citation
“…1. A detailed analysis of the proposed implementation of the algorithm on the FPGA platform is described in [12], but it is worth noting one difference: since in BLAKE the message words m remain active as input parameters to the G modules in all rounds, it is necessary to store and distribute them through a separate, 512-bit path running parallel to the state (compare Fig. 1), while in the KECCAK the message bits are loaded only as the initial value of the state before the first round, after which their storage and distribution to the transformation logic are not needed.…”
Section: A the Ciphersmentioning
confidence: 99%