2021
DOI: 10.1016/j.micpro.2020.103444
|View full text |Cite
|
Sign up to set email alerts
|

SHA2 and SHA-3 accelerator design in a 7 nm technology within the European Processor Initiative

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
30
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
4

Relationship

2
6

Authors

Journals

citations
Cited by 23 publications
(30 citation statements)
references
References 6 publications
0
30
0
Order By: Relevance
“…Other implementation results were not available for further comparison. [30] 512 ASIC-TSMC 7nm 5100 115,200 30,740 3 -0.025 1 The accelerator is connected to the clock signal from the system bus. 2 Estimated results based on system operating frequency and number of clock cycles from [26].…”
Section: Evaluations and Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Other implementation results were not available for further comparison. [30] 512 ASIC-TSMC 7nm 5100 115,200 30,740 3 -0.025 1 The accelerator is connected to the clock signal from the system bus. 2 Estimated results based on system operating frequency and number of clock cycles from [26].…”
Section: Evaluations and Discussionmentioning
confidence: 99%
“…Concerning the SHA-3 hash functions, since NIST's announcement of SHA-3, there has been a surge in research and numerous hardware implementations dedicated to this algorithm, including [28,29]. The current state-of-the-art, well-optimized ASIC implementation [30] in 7 nm TSMC also falls into this category. Evaluations between these works and our results will be discussed in Section 7.…”
Section: Related Workmentioning
confidence: 99%
“…Figure 3 shows the internal architecture of the DRBG module, which relies on a SHA2-256 core and integrates also a buffer containing the current state and a reseed counter. The output of the SHA2-256 [ 5 ] core is used to generate the output stream of the DRBG; therefore, it is constituted by random words of 256 bits, corresponding to the digest of the hashing unit. The reseed counter is in charge to signal when a new seed is required in input to the module, to refresh the entropy level of the output random stream, and to avoid it decreasing too much.…”
Section: Design Of the Random Number Generatormentioning
confidence: 99%
“…This article focuses on the design and test of an all-digital hardware accelerator for random number generation, NIST-compliant at entropy level, with sustained throughput and technology independence. The complete hardware accelerator is to be exploited within the 7 nm European Processor Initiative [ 2 ] ASIC, together with other hardware accelerators that will rely on it (AES [ 3 ], ECC [ 4 ], SHA [ 5 ]). The paper is organized as follows.…”
Section: Introductionmentioning
confidence: 99%
“…Architectural design of a configurable (at synthesis level) ECC crypto-processor for NIST P-256 and/or NIST P-521 elliptic curves, developed in the framework of the European Processor Initiative together with other cryptographic hardware accelerators (AES, RNG [27,28], SHA [29]). The proposed architecture supports the most used cryptographic schemes based on ECC such as ECDSA, ECDH, ECIES and ECMQV.…”
mentioning
confidence: 99%