Proceedings of the 27th International Symposium on Rapid System Prototyping: Shortening the Path From Specification to Prototyp 2016
DOI: 10.1145/2990299.2990318
|View full text |Cite
|
Sign up to set email alerts
|

Model-driven design & synthesis of the SHA-256 cryptographic hash function in ReWire

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 10 publications
0
3
0
Order By: Relevance
“…SHA-256 (secured hashing, FIPS 182-2) is a 256-bit digest cryptographic algorithm. It is an MDC or a unique hash function (Manipulation Detection Code) [45]. A message is broken down into 512 = 16 × 32-bit blocks, with each block taking 64 rounds [46,47].…”
Section: Wireless Communications and Mobile Computingmentioning
confidence: 99%
“…SHA-256 (secured hashing, FIPS 182-2) is a 256-bit digest cryptographic algorithm. It is an MDC or a unique hash function (Manipulation Detection Code) [45]. A message is broken down into 512 = 16 × 32-bit blocks, with each block taking 64 rounds [46,47].…”
Section: Wireless Communications and Mobile Computingmentioning
confidence: 99%
“…There are some constructs of VHDL that have not been implemented in ReWire (e.g., tri-state bu ers, multiple clock domains, etc.). We believe such constructs can be readily modeled in ReWire, but they have not been necessary for previous case studies [84,83,43,42,47,46].…”
Section: Related Workmentioning
confidence: 99%
“…ForSyde targets heterogeneous hardware and software systems whereas ReWire focuses on hardware exclusively. Finally, the formal methodology supported by ReWire, illustrated in previous publications [43,84,46,83], is precisely that of pure functional languages; this is sometimes referred to as "Bird-Wadler" style program derivation (sonamed after an in uential textbook [12]). A Bird-Wadler derivation starts from a reference speci cation for an algorithm in a functional language and, through a series of semantics- Zhai et al [113] consider high-level synthesis from recursive functional languages.…”
Section: Related Workmentioning
confidence: 99%